Edd13Mora / NetWrapper
Simple netexec wraper with html repport
☆17Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for NetWrapper
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆88Updated 3 weeks ago
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated 3 weeks ago
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆90Updated this week
- PowerShell Reverse Shell☆61Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆70Updated this week
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆43Updated this week
- Parses Snaffler output file and generate beautified outputs.☆37Updated 3 months ago
- ☆53Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆102Updated 3 weeks ago
- ☆51Updated 9 months ago
- A Moodle Scanner☆35Updated this week
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 2 months ago
- ☆55Updated 7 months ago
- A repo of scripts I find helpful for daily tasks.☆26Updated 6 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆25Updated 3 weeks ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆34Updated last month
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆78Updated 7 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆80Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Most Responder's configuration power in your hand.☆36Updated 8 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆133Updated 3 months ago
- ☆14Updated 11 months ago