Weaponizing Splunk with reverse and bind shells.
☆182Apr 7, 2017Updated 8 years ago
Alternatives and similar repositories for splunk_shells
Users that are interested in splunk_shells are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 11 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆256Sep 30, 2022Updated 3 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆382Jul 25, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Nov 18, 2020Updated 5 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,315Dec 15, 2020Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,312Oct 1, 2019Updated 6 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,562Mar 11, 2026Updated 2 weeks ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PowerShell Remote Download Cradle Generator & Obfuscator☆854Mar 23, 2018Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆700Aug 9, 2023Updated 2 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- python spraying tools based on impacket lib☆55Sep 6, 2022Updated 3 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Active Directory ACL exploitation with BloodHound☆757Nov 18, 2021Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell MachineAccountQuota and DNS exploit tools☆1,449Jan 11, 2023Updated 3 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,310Aug 19, 2019Updated 6 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,100May 29, 2024Updated last year
- ☆15Dec 16, 2020Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- SharpUp is a C# port of various PowerUp functionality.☆1,472Feb 14, 2024Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,220Aug 7, 2025Updated 7 months ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,651Oct 11, 2018Updated 7 years ago
- A Python based ingestor for BloodHound☆2,368Oct 24, 2025Updated 5 months ago
- Powershell C2 Server and Implants☆576Nov 11, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,930Nov 19, 2025Updated 4 months ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,316Nov 22, 2022Updated 3 years ago