emilyanncr / Windows-Post-ExploitationLinks
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
☆544Updated 4 months ago
Alternatives and similar repositories for Windows-Post-Exploitation
Users that are interested in Windows-Post-Exploitation are comparing it to the libraries listed below
Sorting:
- Windows Privilege Escalation Techniques and Scripts☆944Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆481Updated 5 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,143Updated last year
- A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)☆754Updated last year
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆704Updated 5 years ago
- Tricks for penetration testing☆581Updated 5 years ago
- Cheat sheets for various projects.☆1,084Updated 8 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆522Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,542Updated 3 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆821Updated last month
- Various PowerShell scripts that may be useful during red team exercise☆956Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,654Updated 5 years ago
- A Powershell Privilege Escalation Enumeration Script.☆316Updated 7 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,297Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Updated 5 years ago
- Post Exploitation Wiki☆527Updated 6 years ago
- HTA encryption tool for RedTeams☆1,420Updated 3 years ago
- Simple php reverse shell implemented using binary .☆431Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆1,526Updated 2 years ago
- Building an Active Directory domain and hacking it☆663Updated 6 years ago
- Collection of things made during my OSCP journey☆268Updated 8 years ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆598Updated 5 years ago
- Good For OSCP Training☆440Updated 6 years ago
- Network Pivoting Toolkit☆458Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated last year
- Malicious Macro Generator☆829Updated 6 years ago
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆466Updated 8 years ago