Yeeb1 / shelfLinks
The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful utilities for hacking, automation, and configurations that didn't justify their own repo but are too handy to lose. Useful for quick tasks, testing, or competitive hacking.
☆31Updated 3 weeks ago
Alternatives and similar repositories for shelf
Users that are interested in shelf are comparing it to the libraries listed below
Sorting:
- The different ways to dump lsass☆189Updated last month
- ☆130Updated this week
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆151Updated this week
- ☆113Updated 4 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆90Updated last month
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆167Updated 5 months ago
- ☆153Updated 6 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆167Updated 4 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆152Updated last year
- Azure Post Exploitation Framework☆237Updated this week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆192Updated this week
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆112Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 6 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆208Updated 3 months ago
- Sliver CheatSheet for OSEP☆123Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 4 months ago
- ☆76Updated 5 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆217Updated 7 months ago
- Enumerate Domain Users Without Authentication☆267Updated 5 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆113Updated 3 weeks ago
- C2 Infrastructure Automation☆111Updated 3 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 3 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆135Updated 2 years ago
- Generate and Manage KeyCredentialLinks☆165Updated last month
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆245Updated last month
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆193Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆153Updated 3 months ago
- C++ Reflective Assembly Loader☆28Updated 6 months ago
- ☆91Updated 8 months ago