InfosecMatter / Shells-for-restricted-environmentsLinks
A repository of compiled and ready-to-use shells for Windows restricted environments.
☆36Updated 5 years ago
Alternatives and similar repositories for Shells-for-restricted-environments
Users that are interested in Shells-for-restricted-environments are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆25Updated 4 years ago
- Scripts and One-Liners☆22Updated 4 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆18Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆60Updated 3 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆9Updated 5 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆56Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆95Updated 3 months ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Blog☆11Updated last year
- ☆14Updated last year
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- InfoSec Notes☆56Updated last year
- Active Directory Toolkit☆20Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago