clubby789 / wsshuttleLinks
A tool to tunnel TCP traffic over WinRM
☆18Updated 4 years ago
Alternatives and similar repositories for wsshuttle
Users that are interested in wsshuttle are comparing it to the libraries listed below
Sorting:
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆36Updated 2 years ago
- ☆74Updated 4 months ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- Random☆34Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆86Updated 11 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 4 months ago
- Get Fine Grained Password Policy☆76Updated 6 months ago
- ☆58Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆20Updated 3 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆21Updated 2 years ago
- Custom queries list for BloodHound☆30Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 8 months ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆21Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- ☆39Updated last year
- Your Skyfall Infrastructure Pack☆83Updated last week
- Python3 rewrite of AsOutsider features of AADInternals☆56Updated 3 months ago