cornerpirate / rdpupload
Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible
☆31Updated 10 months ago
Alternatives and similar repositories for rdpupload:
Users that are interested in rdpupload are comparing it to the libraries listed below
- Socks5 server over Websockets☆40Updated 6 years ago
- ☆25Updated 6 years ago
- ☆13Updated 3 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 6 years ago
- ☆15Updated 9 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Random source codes☆25Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- ☆40Updated 6 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 11 months ago
- ☆52Updated 5 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆43Updated 7 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- AV Bypass☆29Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- ☆70Updated 6 years ago