cervoise / Abuse-bash-for-windows
Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018
☆45Updated 5 years ago
Alternatives and similar repositories for Abuse-bash-for-windows
Users that are interested in Abuse-bash-for-windows are comparing it to the libraries listed below
Sorting:
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- AV Bypass☆29Updated 7 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Automated enumeration☆30Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆76Updated 10 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 7 years ago
- Group Policy Hijacking☆31Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13Updated 6 years ago
- ☆50Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- AMSI bypass stager generator☆28Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- ☆59Updated 4 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- ☆58Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago