Python script to decrypt passwords stored by mRemoteNG
☆173Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for mRemoteNG-Decrypt
Users that are interested in mRemoteNG-Decrypt are comparing it to the libraries listed below
Sorting:
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆129Aug 20, 2018Updated 7 years ago
- GitLab User Enumeration☆53Jan 3, 2025Updated last year
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆429Jul 29, 2013Updated 12 years ago
- ☆187Jan 12, 2026Updated last month
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆81Feb 21, 2019Updated 7 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆161Jun 14, 2018Updated 7 years ago
- Joomla login bruteforce☆105Jul 18, 2024Updated last year
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆149Apr 20, 2022Updated 3 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 6 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- getsystem via parent process using ps1 & embeded c#☆467Oct 26, 2023Updated 2 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆949Apr 20, 2022Updated 3 years ago
- Loads a custom dll in system32 via diaghub.☆82Mar 16, 2020Updated 5 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆324Sep 18, 2022Updated 3 years ago
- Extracts Key Values from .keytab files☆348Aug 26, 2020Updated 5 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,155Jan 9, 2021Updated 5 years ago
- SharpUp is a C# port of various PowerUp functionality.☆1,461Feb 14, 2024Updated 2 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,262Feb 16, 2026Updated 2 weeks ago
- A Python based ingestor for BloodHound☆2,347Oct 24, 2025Updated 4 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,732Dec 18, 2021Updated 4 years ago
- Abusing impersonation privileges through the "Printer Bug"☆2,191Sep 10, 2020Updated 5 years ago
- C# implementation of harmj0y's PowerView☆46Mar 22, 2020Updated 5 years ago
- A PowerShell script to download all files, messages and user profiles that a user has access to in slack.☆155Oct 30, 2020Updated 5 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,302Dec 15, 2020Updated 5 years ago
- Exchange privilege escalations to Active Directory☆806Apr 23, 2023Updated 2 years ago
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,637Jan 15, 2024Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,391Jun 27, 2024Updated last year
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,309Nov 22, 2022Updated 3 years ago
- .NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins.☆745Oct 23, 2020Updated 5 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- mRemoteNG Config File Decrypt☆93Oct 29, 2022Updated 3 years ago
- Username tools for penetration testing☆1,333Sep 20, 2024Updated last year
- Kerberoast with ACL abuse capabilities☆611Dec 16, 2024Updated last year
- ☆254Feb 17, 2023Updated 3 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,237Nov 2, 2022Updated 3 years ago