frizb / WindowsShells
Information Repository on Various Methods of getting shell access into a Windows machine
☆16Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for WindowsShells
- Subdomain Enumeration and Scanner☆32Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated this week
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆11Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 4 years ago
- Scripts for OSCE☆18Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Standardizing Security Titles☆13Updated last year
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Brute Force and Scan WinRm Service☆13Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆57Updated 6 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago