clubby789 / wsshuttleLinks
A tool to tunnel TCP traffic over WinRM
☆18Updated 4 years ago
Alternatives and similar repositories for wsshuttle
Users that are interested in wsshuttle are comparing it to the libraries listed below
Sorting:
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆96Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Random☆34Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- ☆72Updated last month
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- ☆39Updated last year
- Your Skyfall Infrastructure Pack☆76Updated 2 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆45Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆92Updated 3 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 4 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆26Updated 2 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆80Updated 8 months ago
- pypykatz plugin for volatility3 framework☆41Updated 2 months ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Custom queries list for BloodHound☆29Updated last month
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆68Updated 2 years ago
- ☆38Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year