Viralmaniar / Remote-Desktop-Caching-Links
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely u…
☆214Updated 6 years ago
Alternatives and similar repositories for Remote-Desktop-Caching-
Users that are interested in Remote-Desktop-Caching- are comparing it to the libraries listed below
Sorting:
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆249Updated last year
- Phishing Template Generation Made Easy☆165Updated 7 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆149Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- SMB Relay Attack Script☆149Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Updated 2 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆451Updated 3 years ago
- PowerShell Empire mod to post-exploit the World!☆137Updated 6 years ago
- ☆283Updated 7 years ago
- Office for Mac Macro Payload Generator☆241Updated 7 years ago
- For all your network pentesting needs☆155Updated last year
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆229Updated 7 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 4 years ago
- Remote Recon and Collection☆454Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆177Updated 9 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- Automated Tactics Techniques & Procedures☆255Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆208Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆197Updated 7 years ago
- Various Cheat Sheets☆181Updated 4 years ago
- Check for valid credentials across a network over SMB☆265Updated last year
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆260Updated 8 years ago
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- Automatically exported from code.google.com/p/creddump☆255Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago