clubby789 / wsshuttleLinks
A tool to tunnel TCP traffic over WinRM
☆18Updated 4 years ago
Alternatives and similar repositories for wsshuttle
Users that are interested in wsshuttle are comparing it to the libraries listed below
Sorting:
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆97Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Dump objects from .NET dumps.☆51Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- Random☆34Updated 2 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆86Updated 10 months ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- ☆39Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 6 months ago
- Get Fine Grained Password Policy☆75Updated 5 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- ☆74Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- ☆59Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 3 months ago
- ☆58Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆97Updated 4 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 7 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆43Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆55Updated 2 months ago