M507 / MinerLinks
Local Privilege Escalation Miner
☆32Updated 3 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below
Sorting:
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Updated 6 years ago
- Reverse shell macro using Word VBA☆17Updated 5 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Updated 4 years ago
- ☆18Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- ☆16Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- ☆66Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago