initstring / pyshell
Simple netcat-like binary for Windows, created with python and py2exe.
☆13Updated 6 years ago
Alternatives and similar repositories for pyshell:
Users that are interested in pyshell are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated this week
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Username lists that I created.☆17Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆32Updated 5 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Combined PowerShell and CMD Reverse Shell☆12Updated 5 years ago
- ☆39Updated 6 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 3 weeks ago
- automatic scan for hackthebox☆14Updated 5 years ago
- ☆17Updated 4 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated this week