VbScrub / VbRev
Windows reverse shell GUI
☆97Updated 3 years ago
Alternatives and similar repositories for VbRev:
Users that are interested in VbRev are comparing it to the libraries listed below
- Collection of username lists for enumerating kerberos domain users☆89Updated 7 years ago
- AV EVASION TECHNIQUES☆77Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆182Updated 3 years ago
- generate payloads that force authentication against an attacker machine☆105Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆118Updated 11 months ago
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆311Updated 2 years ago
- CLI monitor for windows process- & file activity☆83Updated 4 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆221Updated last month
- ☆102Updated last year
- Inject remote template link into word document for remote template injection☆168Updated 4 years ago
- 🍊 Orange Tsai EventViewer RCE☆184Updated 2 years ago
- Fork of BloodHound with PKI nodes and edges for Certipy along with some minor personal improvements☆150Updated 2 years ago
- Dumping LAPS from Python☆264Updated 2 years ago
- Password spraying tool and Bloodhound integration☆229Updated 2 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆266Updated last year
- ☆215Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆270Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆95Updated 3 years ago
- ☆243Updated 2 years ago
- Partial python implementation of SharpGPOAbuse☆406Updated last year
- MSSQL Database Attacker tool☆191Updated 2 years ago
- A variety of AV evasion techniques written in C# for practice.☆85Updated 3 years ago
- ADCS abuser☆277Updated 2 years ago
- PowerShell Constrained Language Mode Bypass☆259Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆423Updated 3 months ago
- Precompiled executable☆50Updated last month
- Attempt at Obfuscated version of SharpCollection☆206Updated last month