WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.
☆44Dec 27, 2018Updated 7 years ago
Alternatives and similar repositories for wmi-shell
Users that are interested in wmi-shell are comparing it to the libraries listed below
Sorting:
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 4 years ago
- ☆23Mar 3, 2020Updated 6 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Process Injection: APC Injection☆32Jan 13, 2021Updated 5 years ago
- ☆16May 9, 2016Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- game of active directory (SnapLabs version)☆15Aug 12, 2025Updated 6 months ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 2 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆15May 17, 2018Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- uuid-shellcode-execution☆13May 9, 2021Updated 4 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆32May 8, 2020Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Dec 3, 2020Updated 5 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- Obtain the (revocation) status of an X.509 certificate.☆16Feb 10, 2026Updated 3 weeks ago
- ☆17Apr 13, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago