Jsitech / relayerLinks
SMB Relay Attack Script
☆148Updated 6 years ago
Alternatives and similar repositories for relayer
Users that are interested in relayer are comparing it to the libraries listed below
Sorting:
- ☆58Updated 5 years ago
- Liniaal - A communication extension to Ruler☆98Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆172Updated 8 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 4 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆123Updated last year
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118Updated 6 years ago
- MS17-010☆63Updated 8 years ago
- Various Cheat Sheets☆182Updated 4 years ago
- For all your network pentesting needs☆154Updated last year
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Updated 10 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago
- A bunch of useful SSH tools for powershell☆120Updated 6 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Updated 9 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆120Updated 5 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Meterpreter Scripts that I'm working on☆171Updated 6 years ago
- Basics of Windows privilege escalation☆133Updated 8 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Updated 8 years ago
- One line PS scripts that may come handy during your network assesment☆77Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- ☆51Updated 11 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago