Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).
☆319Apr 27, 2020Updated 6 years ago
Alternatives and similar repositories for exe2hex
Users that are interested in exe2hex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Homemade scripts to-do various vulnerable challenges☆80Jan 7, 2021Updated 5 years ago
- MSFvenom Payload Creator (MSFPC)☆1,324May 9, 2021Updated 4 years ago
- Powershell VNC injector☆345Jun 29, 2020Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 10 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- A proof of concept for the RDP Inception Attack☆353Jun 29, 2017Updated 8 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Aug 4, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆955Jan 12, 2023Updated 3 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆1,756Dec 9, 2018Updated 7 years ago
- Directory/file & DNS busting tool written in Go☆15Nov 26, 2019Updated 6 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆575Dec 9, 2017Updated 8 years ago
- Run PowerShell command without invoking powershell.exe☆1,551Apr 9, 2026Updated 3 weeks ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆764Jan 28, 2019Updated 7 years ago
- Personal Collection of Operating Systems Scripts☆573May 16, 2024Updated last year
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Malicious Macro Generator☆832Apr 17, 2019Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆454Apr 22, 2016Updated 10 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- application server attack toolkit☆688Apr 6, 2020Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆528Apr 14, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,956Nov 19, 2025Updated 5 months ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago