The-Viper-One / Invoke-RDPThief
Inject RDPThief into memory with PowerShell.
☆58Updated 3 months ago
Alternatives and similar repositories for Invoke-RDPThief:
Users that are interested in Invoke-RDPThief are comparing it to the libraries listed below
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆59Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆101Updated 9 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆65Updated this week
- Tool for Active Directory Certificate Services enumeration and abuse☆95Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- Azure Post Exploitation Framework☆66Updated this week
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- Adversary Emulation Framework☆61Updated 5 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆29Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆92Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆63Updated 3 weeks ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆72Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆107Updated 8 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆101Updated 7 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆152Updated last month
- Source code and examples for PassiveAggression.☆54Updated 7 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- Lateral Movement☆122Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆43Updated 11 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- ☆54Updated 2 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Just another C2 Redirector using CloudFlare.☆82Updated 8 months ago