clubby789 / wsshuttleLinks
A tool to tunnel TCP traffic over WinRM
☆18Updated 4 years ago
Alternatives and similar repositories for wsshuttle
Users that are interested in wsshuttle are comparing it to the libraries listed below
Sorting:
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Exploits made practicing for OSCE☆23Updated 5 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Random☆34Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆102Updated last year
- ☆40Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 6 years ago
- ☆59Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 9 months ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆92Updated last year
- A fast wordlist to nthash converter☆21Updated 4 years ago
- ☆74Updated 6 months ago
- Simple AV Evasion for PE Files☆43Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- pypykatz plugin for volatility3 framework☆45Updated 7 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Presentaciones de congresos☆55Updated last year
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- ☆21Updated 4 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 6 months ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- ☆14Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Custom queries list for BloodHound☆31Updated 6 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago