Viralmaniar / HiveJackLinks
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM hives and once copied to the attacker machines provides option to delete these files to clear the trace.
☆110Updated 5 years ago
Alternatives and similar repositories for HiveJack
Users that are interested in HiveJack are comparing it to the libraries listed below
Sorting:
- Enumerate and decrypt TeamViewer credentials from Windows registry☆242Updated 4 years ago
- Passwordless RDP Session Hijacking☆68Updated 4 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- Automate Metasploit scanning and exploitation☆116Updated 4 months ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 6 months ago
- Web-based check for Windows privesc vulnerabilities☆140Updated 2 years ago
- Some .ps1 scripts for pentesting☆140Updated last month
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Updated 7 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆60Updated 6 years ago
- PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE☆249Updated 5 years ago
- 🔥 Pentest Cheat Sheet☆36Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255Updated 2 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 6 years ago
- I created the python script to bypass UAC to get system shell .☆121Updated 6 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- rsGen is a Reverse Shell Payload Generator for hacking.☆79Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 3 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Updated 4 years ago
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆40Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆40Updated 7 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆175Updated 5 years ago