The-Viper-One / Invoke-RDPThiefLinks
Inject RDPThief into memory with PowerShell.
☆65Updated 7 months ago
Alternatives and similar repositories for Invoke-RDPThief
Users that are interested in Invoke-RDPThief are comparing it to the libraries listed below
Sorting:
- ☆145Updated 3 months ago
- ☆91Updated 7 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 3 months ago
- ☆112Updated 2 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆107Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆96Updated 3 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆127Updated last month
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆206Updated last week
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆138Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆207Updated 10 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆59Updated 2 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- Adversary Emulation Framework☆123Updated last month
- ☆160Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆29Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆150Updated last year
- Continuous password spraying tool☆192Updated 5 months ago
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 7 months ago
- ☆57Updated 6 months ago
- ☆70Updated 5 months ago
- Our Tips&Tricks☆125Updated 6 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆132Updated 3 weeks ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 4 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- Lateral Movement☆124Updated last year