Information Repository on Various Methods of getting shell access into a Windows machine
☆17Feb 11, 2020Updated 6 years ago
Alternatives and similar repositories for WindowsShells
Users that are interested in WindowsShells are comparing it to the libraries listed below
Sorting:
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit☆15Mar 30, 2022Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Reset Excel sheet and workbook protection☆10Jun 23, 2019Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- ☆15May 17, 2018Updated 7 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆309Apr 25, 2019Updated 6 years ago
- Tips and Tricks for Linux Priv Escalation☆226Sep 5, 2021Updated 4 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆16Jan 16, 2022Updated 4 years ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆15Oct 8, 2023Updated 2 years ago
- jgraphx 4.0.4 build for cs project☆22Oct 23, 2020Updated 5 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Jun 11, 2019Updated 6 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago