emilyanncr / Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
☆527Updated 3 years ago
Alternatives and similar repositories for Windows-Post-Exploitation:
Users that are interested in Windows-Post-Exploitation are comparing it to the libraries listed below
- Windows Privilege Escalation Techniques and Scripts☆818Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆475Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,114Updated last month
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,126Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆728Updated 7 months ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆688Updated 4 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,468Updated 2 years ago
- Various PowerShell scripts that may be useful during red team exercise☆937Updated 2 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆512Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,563Updated 4 years ago
- Tricks for penetration testing☆568Updated 4 years ago
- Cheat sheets for various projects.☆1,046Updated 7 years ago
- A Powershell Privilege Escalation Enumeration Script.☆306Updated 6 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆1,486Updated last year
- HTA encryption tool for RedTeams☆1,372Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆558Updated 8 months ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆577Updated 4 years ago
- Simple php reverse shell implemented using binary .☆402Updated last year
- Good For OSCP Training☆437Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆569Updated 6 months ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆782Updated 3 weeks ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆818Updated 2 years ago
- Windows Local Privilege Escalation from Service Account to System☆725Updated 4 years ago
- An script to perform kerberos bruteforcing by using impacket☆442Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,058Updated 4 years ago
- SharpUp is a C# port of various PowerUp functionality.☆1,296Updated 11 months ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆555Updated 4 years ago
- Active Directory ACL exploitation with BloodHound☆708Updated 3 years ago