carlospolop / DDexec
☆46Updated 2 years ago
Alternatives and similar repositories for DDexec:
Users that are interested in DDexec are comparing it to the libraries listed below
- C2 Automation using Linode☆80Updated 2 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- ☆122Updated last year
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 2 months ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆13Updated 6 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆118Updated 7 months ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 3 years ago
- ☆51Updated 2 years ago
- Smart Card PIN swiping DLL☆78Updated 4 years ago
- Posts about different topics☆36Updated last year
- Artifact monitoring that ensures fairplay☆75Updated 3 months ago
- ☆35Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Bypassing AppLocker with C#☆140Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 7 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆91Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 2 years ago
- ☆117Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Pre-compiled builds for CVE-2021-4034☆25Updated 3 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago