devploit / unaalmes-writeupsLinks
Repository to save all write-ups from UAM challenges
☆29Updated 5 years ago
Alternatives and similar repositories for unaalmes-writeups
Users that are interested in unaalmes-writeups are comparing it to the libraries listed below
Sorting:
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- ☆155Updated last month
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- ☆36Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Updated 5 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆242Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 4 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆177Updated 5 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 5 years ago
- ☆174Updated 7 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 10 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated last month
- VBS reverse shell scripts☆62Updated 7 years ago
- This is a weaponized WSUS exploit☆298Updated 3 years ago
- easy-to-use payload hosting☆275Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- ☆101Updated last year
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆33Updated 10 months ago
- Windows active user credential phishing tool☆283Updated 5 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆192Updated 5 years ago
- Basic C2 Server☆193Updated 4 years ago
- Weaponizing Splunk with reverse and bind shells.☆182Updated 8 years ago
- An SNMPv3 User Enumerator and Attack tool☆260Updated 5 years ago
- Enyx SNMP IPv6 Enumeration Tool☆106Updated 2 years ago
- ATTPwn☆217Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago