InfosecMatter / Shells-for-restricted-environmentsLinks
A repository of compiled and ready-to-use shells for Windows restricted environments.
☆36Updated 5 years ago
Alternatives and similar repositories for Shells-for-restricted-environments
Users that are interested in Shells-for-restricted-environments are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆25Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆56Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- miscellaneous sploit scripts/hacks☆16Updated 4 months ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Scripts and One-Liners☆22Updated 4 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- Password Spraying Framework☆63Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆95Updated 4 months ago
- RDP Checker☆63Updated last year
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆106Updated 10 months ago
- ☆12Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- ☆14Updated last year
- My Python Cookiecutter project template☆32Updated 2 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago