This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows OS with Powershell enabled.
☆300May 5, 2016Updated 9 years ago
Alternatives and similar repositories for JSRat-Py
Users that are interested in JSRat-Py are comparing it to the libraries listed below
Sorting:
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆115Apr 16, 2016Updated 9 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆691Dec 29, 2017Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- Use CLR to inject all the .NET apps☆184Apr 17, 2021Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- A post-exploitation OS X/Linux agent written in Python 2.7☆873Aug 24, 2017Updated 8 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Undetectable Windows Payload Generation☆1,607Nov 8, 2022Updated 3 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)