initstring / pyshell
Simple netcat-like binary for Windows, created with python and py2exe.
☆13Updated 6 years ago
Alternatives and similar repositories for pyshell:
Users that are interested in pyshell are comparing it to the libraries listed below
- Custom pentesting tools☆25Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Username lists that I created.☆17Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- ☆39Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- Poc script for ProxyShell exploit chain in Exchange Server☆20Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Updated 4 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 5 years ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- miscellaneous sploit scripts/hacks☆16Updated 2 months ago
- ☆17Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Subdomain Enumeration and Scanner☆33Updated 4 years ago