inguardians / Invoke-ClipboardLinks
All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications
☆71Updated 6 years ago
Alternatives and similar repositories for Invoke-Clipboard
Users that are interested in Invoke-Clipboard are comparing it to the libraries listed below
Sorting:
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆227Updated 2 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆168Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- ☆42Updated 4 years ago
- ☆9Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆39Updated 3 months ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- BloodHound Docker Ready to Use☆90Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- ADCS abuser☆288Updated 2 years ago
- Obfuscated Penetration Testing PowerShell scripts☆147Updated 6 months ago
- Python based BloodHound data importer☆147Updated last year
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- ☆45Updated 8 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- Collection of cyphers for bloodhound☆150Updated 11 months ago
- ☆53Updated 6 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Inject remote template link into word document for remote template injection☆177Updated 4 years ago
- DAFT: Database Audit Framework & Toolkit☆179Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆233Updated 3 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- ☆220Updated 2 years ago