JoelGMSec / Invoke-Transfer
PowerShell Clipboard Data Transfer
☆68Updated 6 months ago
Alternatives and similar repositories for Invoke-Transfer:
Users that are interested in Invoke-Transfer are comparing it to the libraries listed below
- Duplicate not owned Token from Running Process☆72Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- C# havoc implant☆98Updated 2 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆108Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆63Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- Windows Privilege Escalation☆54Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- PowerShell Reverse Shell☆61Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆132Updated 5 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 3 years ago
- ACL abuse swiss-knife☆119Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆65Updated 9 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆108Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆83Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆73Updated 2 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 5 months ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆175Updated 2 years ago
- ☆55Updated 10 months ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago