InfosecMatter / Shells-for-restricted-environments
A repository of compiled and ready-to-use shells for Windows restricted environments.
☆36Updated 5 years ago
Alternatives and similar repositories for Shells-for-restricted-environments:
Users that are interested in Shells-for-restricted-environments are comparing it to the libraries listed below
- Custom pentesting tools☆25Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 2 weeks ago
- ☆41Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 4 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆106Updated 7 months ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- ☆45Updated 2 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆49Updated 7 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 3 years ago
- ☆31Updated 4 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆93Updated last month
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆59Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 5 years ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- Scripts and One-Liners☆21Updated last month
- Bloodhound Portable for Windows☆51Updated last year
- ☆13Updated 5 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 6 years ago
- Active Directory Toolkit☆20Updated 5 years ago