emilyanncr / Windows-Post-ExploitationLinks
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
☆544Updated last week
Alternatives and similar repositories for Windows-Post-Exploitation
Users that are interested in Windows-Post-Exploitation are comparing it to the libraries listed below
Sorting:
- Windows Privilege Escalation Techniques and Scripts☆913Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆479Updated 5 years ago
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆749Updated last year
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆698Updated 5 years ago
- Tricks for penetration testing☆578Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,138Updated 10 months ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- Cheat sheets for various projects.☆1,077Updated 7 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,208Updated 6 years ago
- A Powershell Privilege Escalation Enumeration Script.☆313Updated 7 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,524Updated 2 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆582Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆819Updated 5 months ago
- Simple php reverse shell implemented using binary .☆423Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆950Updated 3 years ago
- Post Exploitation Wiki☆522Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆579Updated last year
- Good For OSCP Training☆437Updated 6 years ago
- Collection of things made during my OSCP journey☆265Updated 7 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,625Updated 4 years ago
- HTA encryption tool for RedTeams☆1,403Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆771Updated 5 years ago
- Building an Active Directory domain and hacking it☆662Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆1,519Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆509Updated 6 years ago
- Collection of things made during my OSCP journey☆951Updated 3 years ago
- Network Pivoting Toolkit☆453Updated 2 years ago
- Active Directory ACL exploitation with BloodHound☆742Updated 3 years ago