JoelGMSec / Invoke-Transfer
PowerShell Clipboard Data Transfer
☆66Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Invoke-Transfer
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆107Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆62Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆65Updated last year
- PowerShell Reverse Shell☆61Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆85Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆56Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆53Updated 7 months ago
- ☆46Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆104Updated 9 months ago
- C# havoc implant☆96Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆61Updated 2 years ago
- A C2 framework built for my bachelors thesis☆53Updated 2 weeks ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- ACL abuse swiss-knife☆117Updated last year
- Lateral Movement☆119Updated last year
- Reasonably undetected shellcode stager and executer.☆35Updated 2 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 2 months ago
- ☆25Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- ☆53Updated 7 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- ☆51Updated 9 months ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆158Updated last year