Jsitech / relayer
SMB Relay Attack Script
☆148Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for relayer
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- ☆59Updated 4 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- For all your network pentesting needs☆150Updated 4 months ago
- OFFICE DDEAUTO Payload Generation script☆125Updated 3 years ago
- ☆52Updated 10 years ago
- Meterpreter Scripts that I'm working on☆172Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated last year
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- Various Cheat Sheets☆179Updated 3 years ago
- Active Directory enumeration from non-domain system.☆117Updated 7 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆117Updated 5 years ago
- Domain user enumeration tool☆212Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆167Updated 7 years ago
- One line PS scripts that may come handy during your network assesment☆74Updated 4 years ago
- Port of eternal blue exploits to powershell☆149Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- Misc. PowerShell scripts☆115Updated 8 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆164Updated 6 years ago
- How To Execute Shellcode via HTA☆136Updated 6 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆111Updated 7 years ago
- Powershell Empire Persistence finder☆117Updated 7 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆168Updated last year
- This project is just a dumping ground for random scripts I've developed.☆137Updated 3 months ago