devploit / unaalmes-writeupsLinks
Repository to save all write-ups from UAM challenges
☆29Updated 4 years ago
Alternatives and similar repositories for unaalmes-writeups
Users that are interested in unaalmes-writeups are comparing it to the libraries listed below
Sorting:
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- ☆151Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆123Updated 5 years ago
- Active Directory Group Policy Preferences cpassword cracker/decrypter.☆24Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆242Updated 4 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆176Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 6 months ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 3 years ago
- Weaponizing Splunk with reverse and bind shells.☆183Updated 8 years ago
- ☆36Updated 3 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- ☆100Updated 10 months ago
- ☆53Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆140Updated last year
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Obfuscated Penetration Testing PowerShell scripts☆148Updated 9 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week