Logisek / AfterShellLinks
Fast Windows post-exploitation wins after initial access.
☆20Updated this week
Alternatives and similar repositories for AfterShell
Users that are interested in AfterShell are comparing it to the libraries listed below
Sorting:
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- Command and Control Framework using powershell implants☆35Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- ☆39Updated 3 years ago
- Nemesis agent for Mythic☆28Updated last month
- Ansible role that Installs Mythic☆18Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆37Updated 7 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆38Updated 3 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated last month
- Leverages B64 chunks to split files and save to clipboard☆26Updated last month
- ☆16Updated last month
- ☆15Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Updated last year
- Red Team Coin for crypto-mining operations.☆21Updated last week
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Top hashpwn rules☆21Updated last month
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- ☆13Updated 4 years ago
- F5 Service Password Decryption☆29Updated 5 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Updated 9 months ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 7 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆42Updated 2 weeks ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ☆12Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago