Yeeb1 / shelfLinks
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆33Updated 2 weeks ago
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- ☆152Updated 3 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆132Updated last week
- ☆119Updated 7 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆187Updated 8 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆267Updated this week
- The different ways to dump lsass☆204Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆209Updated 3 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 10 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 4 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆175Updated 7 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆210Updated 6 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆257Updated 2 months ago
- A community-driven collection of BloodHound queries☆159Updated last week
- ☆79Updated 8 months ago
- Azure Post Exploitation Framework☆244Updated 2 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181Updated 7 months ago
- ☆157Updated 8 months ago
- Generate and Manage KeyCredentialLinks☆180Updated 3 months ago
- Utilities for obfuscating shellcode☆97Updated 3 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆277Updated last week
- Enumerate Domain Users Without Authentication☆281Updated 8 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 6 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆250Updated 3 weeks ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- ☆62Updated last month
- ☆94Updated 11 months ago
- ☆96Updated last month
- sl0ppy-PrivescTaskCreator.ps1☆39Updated 3 months ago