M507 / MinerLinks
Local Privilege Escalation Miner
☆29Updated 3 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below
Sorting:
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- ☆12Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- A collection of my presentation materials.☆17Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- Custom pentesting tools☆25Updated 5 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- Triaging Windows event logs based on SANS Poster☆42Updated 2 weeks ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆22Updated 3 years ago
- Sp00fer blog post -☆25Updated 3 years ago