antonioCoco / ConPtyShell
ConPtyShell - Fully Interactive Reverse Shell for Windows
☆1,056Updated 2 years ago
Alternatives and similar repositories for ConPtyShell:
Users that are interested in ConPtyShell are comparing it to the libraries listed below
- Compiled Binaries for Ghostpack☆1,242Updated 3 months ago
- Windows Local Privilege Escalation from Service Account to System☆740Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆1,918Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,063Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,056Updated 8 months ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,797Updated 2 months ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,101Updated 6 months ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,567Updated 4 years ago
- ☆1,551Updated 7 months ago
- SharpUp is a C# port of various PowerUp functionality.☆1,303Updated 11 months ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,362Updated 2 weeks ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,129Updated 5 years ago
- The Hunt for Malicious Strings☆1,148Updated 2 years ago
- Extract credentials from lsass remotely☆2,081Updated 3 weeks ago
- Kerberos unconstrained delegation abuse toolkit☆1,223Updated this week
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆589Updated 4 years ago
- Windows AV Evasion☆755Updated 4 years ago
- A small reverse shell for Linux & Windows☆593Updated 7 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,203Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,037Updated last month
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,655Updated 4 months ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆820Updated 2 years ago
- Starkiller is a Frontend for PowerShell Empire.☆1,403Updated 4 months ago
- A Python based ingestor for BloodHound☆2,011Updated 3 weeks ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,044Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆618Updated 3 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,766Updated 5 months ago
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,030Updated 3 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,215Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,355Updated 2 years ago