A tool for security professionals to access and interact with remote Microsoft Windows based systems.
☆432Nov 17, 2017Updated 8 years ago
Alternatives and similar repositories for ranger
Users that are interested in ranger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆454Apr 22, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 10 years ago
- An automated SMB relay exploitation script.☆152Oct 11, 2016Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174May 6, 2016Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆145Aug 9, 2015Updated 10 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆683Oct 27, 2016Updated 9 years ago
- A repository for large scripts from my book.☆160Oct 1, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- ☆741Jan 16, 2021Updated 5 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆410Jul 14, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆171Mar 7, 2018Updated 8 years ago
- PowerShell Empire Web Interface☆329May 20, 2023Updated 2 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆847Jun 25, 2024Updated last year