Yeeb1 / shelfLinks
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆31Updated last month
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- ☆112Updated 2 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 3 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆144Updated last month
- C++ Reflective Assembly Loader☆27Updated 5 months ago
- Sliver CheatSheet for OSEP☆95Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 5 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- ☆153Updated 4 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆163Updated 2 months ago
- Azure Post Exploitation Framework☆203Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆158Updated last month
- ☆14Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆67Updated 8 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆196Updated last week
- A list of all Active Directory machines from HackTheBox☆62Updated 2 weeks ago
- ☆189Updated 2 months ago
- Enumerate Domain Users Without Authentication☆257Updated 3 months ago
- ☆160Updated 5 months ago
- A community-driven collection of BloodHound queries☆111Updated last month
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆59Updated last month
- ☆90Updated 6 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆161Updated last month
- ☆78Updated last year
- ☆143Updated 2 months ago
- ☆144Updated 3 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆201Updated last month
- This repository contains custom modifications and enhancements for EvilGinx, a man-in-the-middle attack framework used for security resea…☆78Updated this week
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago