get-get-get-get / PowerProxyLinks
PowerShell SOCKS proxy with reverse proxy capabilities
☆81Updated 4 years ago
Alternatives and similar repositories for PowerProxy
Users that are interested in PowerProxy are comparing it to the libraries listed below
Sorting:
- ☆94Updated 2 years ago
- ☆129Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆94Updated last year
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆89Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Password Spraying Framework☆63Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆130Updated 3 years ago
- Checks for signature requirements over LDAP☆97Updated 2 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆190Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆62Updated 5 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆187Updated 4 years ago
- C# tool to discover low hanging fruits☆94Updated 2 years ago
- DCSync Attack from Outside using Impacket☆114Updated 3 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆142Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY