M507 / MinerLinks
Local Privilege Escalation Miner
☆29Updated 3 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below
Sorting:
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- ☆12Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago
- ☆58Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆73Updated 6 months ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- ☆17Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆40Updated 3 weeks ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆72Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Sp00fer blog post -☆25Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago