atthacks / RunAsUserLinks
This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell and find credentials for another user. You can then execute a program as that other user.
☆21Updated 3 years ago
Alternatives and similar repositories for RunAsUser
Users that are interested in RunAsUser are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Noob Penetration tester☆11Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆16Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- ☆15Updated 3 years ago
- ☆14Updated 3 years ago
- ☆18Updated last year
- Wordlist generator☆16Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- ☆33Updated 5 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- ☆16Updated 2 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago