PhrozenIO / run-as-attached-networkedLinks
RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (Ex: Netcat)
☆76Updated 2 years ago
Alternatives and similar repositories for run-as-attached-networked
Users that are interested in run-as-attached-networked are comparing it to the libraries listed below
Sorting:
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆55Updated 4 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆98Updated 9 months ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Updated 3 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Updated last year
- ☆97Updated 3 years ago
- Run shellcode through InnoSetup code engine.☆70Updated 2 years ago
- Machine Learning Network Share Password Hunting Toolkit☆128Updated 5 years ago
- Some random system tools for Windows☆115Updated 3 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆67Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- ☆70Updated 5 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- Password Spraying Framework☆63Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 3 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- PowerShell payload generator☆118Updated 4 years ago
- ☆133Updated 4 years ago
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆60Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆142Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- ☆99Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Simple .NET assembly to interact with services.☆42Updated 6 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆124Updated 2 years ago