Pennyw0rth / NetExecLinks
The Network Execution Tool
☆4,323Updated this week
Alternatives and similar repositories for NetExec
Users that are interested in NetExec are comparing it to the libraries listed below
Sorting:
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,572Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,451Updated 6 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,841Updated 2 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,652Updated 2 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,962Updated 10 months ago
- game of active directory☆6,518Updated 3 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,900Updated 6 months ago
- Trying to tame the three-headed dog.☆4,507Updated 2 months ago
- Adversary Emulation Framework☆9,525Updated last week
- Tool for Active Directory Certificate Services enumeration and abuse☆2,924Updated last week
- A collaborative, multi-platform, red teaming framework☆3,753Updated last week
- Privilege Escalation Enumeration Script for Windows☆3,333Updated 2 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,508Updated 6 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,977Updated last month
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,407Updated 2 months ago
- The Havoc Framework☆7,621Updated 5 months ago
- Six Degrees of Domain Admin☆1,750Updated this week
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,196Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,296Updated 10 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,598Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,262Updated 5 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,434Updated last week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,138Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,136Updated 3 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,537Updated 3 weeks ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,985Updated last week
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,513Updated 3 weeks ago
- Mimikatz implementation in pure Python☆3,059Updated 3 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,663Updated 2 weeks ago
- Monitor linux processes without root permissions☆5,499Updated 2 years ago