Viralmaniar / PeekABooLinks
PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses PowerShell remoting to perform this task. Note: Remote desktop is disabled by default on all Windows operating systems.
☆141Updated 6 years ago
Alternatives and similar repositories for PeekABoo
Users that are interested in PeekABoo are comparing it to the libraries listed below
Sorting:
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Updated 6 years ago
- Automate Metasploit scanning and exploitation☆116Updated 4 months ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- Simple python backdoor with Ngrok tunnel support☆206Updated 2 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 6 years ago
- The Metasploit GUI☆92Updated 9 years ago
- Web application backdoor builder☆74Updated 4 years ago
- Passwordless RDP Session Hijacking☆68Updated 4 years ago
- Exploit Pack - Project☆72Updated 6 years ago
- Installing Kali linux on Vps Server☆117Updated 6 years ago
- Autosploit = Automating Metasploit Modules.☆78Updated 6 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆242Updated 4 years ago
- Using IPv6 to Bypass Security☆92Updated 3 months ago
- rsGen is a Reverse Shell Payload Generator for hacking.☆79Updated 3 years ago
- Social Engineering Tool☆189Updated 7 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆223Updated last year
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆105Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- a hash query tool☆36Updated 6 years ago
- gui tool to create normal payload by msfvenom☆34Updated 6 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆40Updated 7 years ago
- wordpress hash cracker .☆66Updated 4 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- ☆19Updated 8 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago