Weaponizing Splunk with reverse and bind shells.
☆182Apr 7, 2017Updated 9 years ago
Alternatives and similar repositories for splunk_shells
Users that are interested in splunk_shells are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 11 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆256Sep 30, 2022Updated 3 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Nov 18, 2020Updated 5 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,321Dec 15, 2020Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,317Oct 1, 2019Updated 6 years ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,573Mar 11, 2026Updated last month
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PowerShell Remote Download Cradle Generator & Obfuscator☆850Mar 23, 2018Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆700Aug 9, 2023Updated 2 years ago
- Payload Generation Framework☆1,978Aug 21, 2024Updated last year
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Active Directory ACL exploitation with BloodHound☆760Nov 18, 2021Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆180Oct 21, 2018Updated 7 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆178Sep 18, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆289Aug 7, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerShell MachineAccountQuota and DNS exploit tools☆1,455Jan 11, 2023Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,317Aug 19, 2019Updated 6 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,112May 29, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- SharpUp is a C# port of various PowerUp functionality.☆1,487Feb 14, 2024Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,219Aug 7, 2025Updated 8 months ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆618Feb 16, 2023Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,652Oct 11, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Python based ingestor for BloodHound☆2,376Oct 24, 2025Updated 5 months ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,942Nov 19, 2025Updated 5 months ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,317Nov 22, 2022Updated 3 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆124Jul 7, 2023Updated 2 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago