Yeeb1 / shelfLinks
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆32Updated 2 months ago
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- ☆144Updated last month
- The different ways to dump lsass☆195Updated 3 months ago
- ☆117Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆183Updated last month
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆209Updated 4 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆264Updated 3 weeks ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 4 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 6 months ago
- A community-driven collection of BloodHound queries☆153Updated last month
- C++ Reflective Assembly Loader☆28Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆294Updated last week
- A list of all Active Directory machines from HackTheBox☆66Updated 2 weeks ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
- Enumerate Domain Users Without Authentication☆270Updated 6 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆174Updated last week
- Generate and Manage KeyCredentialLinks☆177Updated last month
- ☆158Updated 5 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆170Updated 5 months ago
- Azure Post Exploitation Framework☆241Updated 2 weeks ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 8 months ago
- ☆202Updated 5 months ago
- ☆14Updated 4 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 4 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆170Updated 3 weeks ago
- ☆78Updated 6 months ago
- ☆154Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆141Updated 3 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 4 months ago