Pennyw0rth / NetExecLinks
The Network Execution Tool
☆4,748Updated last week
Alternatives and similar repositories for NetExec
Users that are interested in NetExec are comparing it to the libraries listed below
Sorting:
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,911Updated 4 months ago
- Six Degrees of Domain Admin☆2,415Updated this week
- game of active directory☆6,955Updated 2 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,766Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆3,162Updated this week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,577Updated 10 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,065Updated last month
- Trying to tame the three-headed dog.☆4,658Updated 3 weeks ago
- A collaborative, multi-platform, red teaming framework☆4,011Updated last week
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,335Updated 8 months ago
- The Havoc Framework☆7,857Updated 2 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,073Updated last year
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,163Updated this week
- Privilege Escalation Enumeration Script for Windows☆3,472Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,599Updated 3 months ago
- Adversary Emulation Framework☆10,045Updated 2 weeks ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,305Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,851Updated 3 weeks ago
- The ultimate WinRM shell for hacking/pentesting☆5,038Updated last week
- Fully featured and community-driven hacking environment☆2,582Updated 3 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,919Updated 6 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,249Updated 4 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,556Updated this week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,082Updated last month
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,110Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,566Updated last month
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,926Updated this week
- Red Teaming Tactics and Techniques☆4,377Updated last year
- A Python based ingestor for BloodHound☆2,239Updated last month
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,297Updated 6 months ago