inguardians / Invoke-ClipboardLinks
All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications
☆74Updated 6 years ago
Alternatives and similar repositories for Invoke-Clipboard
Users that are interested in Invoke-Clipboard are comparing it to the libraries listed below
Sorting:
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆167Updated 3 years ago
- BloodHound Docker Ready to Use☆89Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆231Updated 2 years ago
- Python based BloodHound data importer☆146Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 8 months ago
- Powershell function to pull the local admin passwords from LDAP, stored there by LAPS.☆120Updated 5 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- ☆9Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- ☆150Updated 2 years ago
- ☆44Updated 8 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆40Updated 5 months ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- ☆42Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆63Updated 6 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆190Updated 5 years ago
- Collection of cyphers for bloodhound☆151Updated last year
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago
- Weaponizing Splunk with reverse and bind shells.☆183Updated 8 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆122Updated last year
- ☆147Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 4 years ago