VbScrub / VbRevLinks
Windows reverse shell GUI
☆101Updated 4 years ago
Alternatives and similar repositories for VbRev
Users that are interested in VbRev are comparing it to the libraries listed below
Sorting:
- Collection of username lists for enumerating kerberos domain users☆104Updated 7 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆202Updated 4 years ago
- Powershell version of SharpGPOAbuse☆88Updated 4 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Updated 10 months ago
- Reverse TCP shell in PowerShell for fun. Made in spring 2020 with inspiration from (and a few fixes to) samratashok/nishang Invoke-PowerS…☆72Updated last year
- Retrieve LAPS password from LDAP☆430Updated 4 years ago
- Windows Privilege Escalation☆69Updated 3 years ago
- ☆92Updated 5 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- AV Evasion Techniques☆82Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated 2 weeks ago
- MSSQL Database Attacker tool☆193Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆76Updated last year
- Shellcode launcher for AV bypass☆216Updated last year
- Extendable payload obfuscation and delivery framework☆145Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Updated 3 years ago
- Run Powershell without software restrictions.☆282Updated 4 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆118Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- Impersonating authentication over HTTP and/or named pipes.☆141Updated 4 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 2 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆109Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits☆159Updated 4 years ago
- SeRestorePrivilege to SYSTEM☆130Updated 4 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- A little tool to play with Outlook☆207Updated 4 years ago