basicScandal / WinHackingBin
Collection of Windows Hacking Binaries
☆50Updated 9 years ago
Alternatives and similar repositories for WinHackingBin:
Users that are interested in WinHackingBin are comparing it to the libraries listed below
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆144Updated 5 years ago
- ☆207Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆130Updated 6 years ago
- Various Aggressor Scripts I've Created.☆148Updated 3 years ago
- A collection of useful scripts for Cobalt Strike☆166Updated 7 months ago
- Malleable C2 profiles for Cobalt Strike☆70Updated 2 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆182Updated 7 months ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- Cobalt Strike Aggressor Scripts☆140Updated 4 months ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- ☆42Updated 6 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆169Updated 6 years ago
- Domain user enumeration tool☆215Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Updated 6 years ago
- POC for Cobalt Strike external C2☆131Updated 3 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆62Updated 6 years ago
- ☆73Updated 7 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆129Updated 9 years ago
- PowerView menu for Cobalt Strike☆67Updated 7 years ago
- Cobalt Strike SCT payload obfuscator☆141Updated 7 years ago
- Repo with various Red Team scripts☆145Updated 4 years ago
- CVE-2018-8581☆371Updated 2 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 6 years ago
- SQL Server Reporting Services(CVE-2020-0618)中的RCE☆198Updated 5 years ago
- ☆186Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆200Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆330Updated 7 years ago
- Active Directory pentest scripts☆121Updated 9 years ago
- NTDS.dit offline dumper with non-elevated☆217Updated 7 years ago
- Custom THP Dropper☆26Updated 6 years ago