Yeeb1 / shelfLinks
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆33Updated last month
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- ☆154Updated 4 months ago
- The different ways to dump lsass☆261Updated 5 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆213Updated 3 weeks ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆149Updated last month
- Python tool to automatically perform SPN-less RBCD attacks.☆114Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Updated 9 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆276Updated 3 weeks ago
- Enumerate Domain Users Without Authentication☆281Updated 9 months ago
- ☆120Updated 8 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆167Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Updated 6 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆157Updated 7 months ago
- ☆94Updated last year
- ☆82Updated 9 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆290Updated 2 weeks ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆206Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 8 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 9 months ago
- ☆159Updated 9 months ago
- Azure Post Exploitation Framework☆244Updated 3 months ago
- ☆235Updated 8 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆121Updated 5 months ago
- A community-driven collection of BloodHound queries☆159Updated last week
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179Updated 8 months ago
- ☆63Updated last month
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 10 months ago
- Our Tips&Tricks☆128Updated 11 months ago
- Continuous password spraying tool☆200Updated 2 months ago
- RunPE implementation with multiple evasive techniques (2)☆269Updated 4 months ago
- Generate and Manage KeyCredentialLinks☆241Updated last week