deepzec / Win-PortFwdLinks
Powershell script to setup windows port forwarding using native netsh client
☆125Updated 7 years ago
Alternatives and similar repositories for Win-PortFwd
Users that are interested in Win-PortFwd are comparing it to the libraries listed below
Sorting:
- SMB Relay Attack Script☆148Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- ☆51Updated 11 years ago
- ☆101Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆107Updated 5 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- ☆63Updated 7 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Updated 8 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 4 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118Updated 6 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 8 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆172Updated 8 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Updated 9 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- ☆58Updated 5 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Updated 7 years ago
- ☆58Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- MS17-010☆63Updated 8 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 7 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆123Updated last year
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- ☆66Updated 7 years ago