Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).
☆317Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for exe2hex
Users that are interested in exe2hex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- MSFvenom Payload Creator (MSFPC)☆1,317May 9, 2021Updated 4 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301May 5, 2016Updated 9 years ago
- A proof of concept for the RDP Inception Attack☆353Jun 29, 2017Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆1,736Dec 9, 2018Updated 7 years ago
- Directory/file & DNS busting tool written in Go☆14Nov 26, 2019Updated 6 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆574Dec 9, 2017Updated 8 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆761Jan 28, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Personal Collection of Operating Systems Scripts☆572May 16, 2024Updated last year
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- application server attack toolkit☆687Apr 6, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,930Nov 19, 2025Updated 4 months ago
- Run PowerShell command without invoking powershell.exe☆1,536Mar 23, 2023Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- Payload Generation Framework☆1,978Aug 21, 2024Updated last year
- My musings with PowerShell☆2,708Nov 19, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago