Yeeb1 / shelfLinks
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆31Updated last month
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 6 months ago
- The different ways to dump lsass☆193Updated 2 months ago
- ☆141Updated 3 weeks ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆255Updated last week
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆207Updated 3 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆169Updated 4 months ago
- ☆114Updated 4 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆254Updated this week
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆174Updated last month
- psexecsvc - a python implementation of PSExec's native service implementation☆217Updated 8 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆95Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆137Updated 6 months ago
- A community-driven collection of BloodHound queries☆152Updated last week
- Enumerate Domain Users Without Authentication☆268Updated 6 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆169Updated 3 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆116Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆267Updated 3 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆260Updated 5 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 3 months ago
- ☆201Updated 5 months ago
- ☆157Updated 4 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆251Updated 8 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆263Updated this week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- Azure Post Exploitation Framework☆240Updated 3 weeks ago
- Our Tips&Tricks☆126Updated 8 months ago
- Generate and Manage KeyCredentialLinks☆173Updated 2 weeks ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆218Updated last year