Edd13Mora / NetWrapper
Simple netexec wraper with html repport
☆18Updated 10 months ago
Alternatives and similar repositories for NetWrapper:
Users that are interested in NetWrapper are comparing it to the libraries listed below
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- ☆51Updated 2 months ago
- ☆83Updated 2 months ago
- PowerShell Reverse Shell☆61Updated last year
- ☆33Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- ☆54Updated last month
- ☆79Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆98Updated 4 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 5 months ago
- C++ Reflective Assembly Loader☆20Updated 2 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆17Updated last year
- A Moodle Scanner☆39Updated 4 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 6 months ago
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Most Responder's configuration power in your hand.☆46Updated 2 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- ☆58Updated 5 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Parses Snaffler output file and generate beautified outputs.☆88Updated 2 months ago
- ☆62Updated last week