abatchy17 / Privilege-Escalation
☆10Updated this week
Related projects: ⓘ
- ☆19Updated 7 years ago
- ☆19Updated this week
- Mimikatz HashClash☆12Updated 9 years ago
- PHDAYS |||☆17Updated 11 years ago
- ☆20Updated this week
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- AWS S3 Bucket/Object Finder☆25Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆46Updated 6 years ago
- PIC code gen and loading☆13Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 6 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago
- Misc stuff☆10Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆34Updated 7 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- ☆58Updated 7 years ago
- ☆15Updated this week
- Automating those tasks which can or should be automated☆58Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 5 years ago
- ☆0Updated 5 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆34Updated 7 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 4 years ago
- Generates several metasploit payloads☆15Updated 6 years ago