Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible
☆33May 3, 2024Updated last year
Alternatives and similar repositories for rdpupload
Users that are interested in rdpupload are comparing it to the libraries listed below
Sorting:
- ☆11Jul 16, 2017Updated 8 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- ☆59May 1, 2019Updated 6 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Memory Backed Powershell WebDav Server☆138Mar 7, 2021Updated 5 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- meow☆12Dec 6, 2015Updated 10 years ago