int0x33 / nc.exeLinks
Netcat for windows 32/64 bit
☆771Updated last year
Alternatives and similar repositories for nc.exe
Users that are interested in nc.exe are comparing it to the libraries listed below
Sorting:
- Abusing impersonation privileges through the "Printer Bug"☆2,172Updated 5 years ago
- WhiteWinterWolf's PHP web shell☆738Updated 8 years ago
- Compiled Binaries for Ghostpack☆1,591Updated last year
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,340Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,524Updated last month
- A tool to perform Kerberos pre-auth bruteforcing☆3,236Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆627Updated 4 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,184Updated 3 years ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆526Updated 2 years ago
- Penelope Shell Handler☆1,513Updated this week
- ☆1,330Updated last week
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,370Updated 9 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,726Updated 4 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,390Updated 2 years ago
- ☆986Updated 3 years ago
- Username tools for penetration testing☆1,308Updated last year
- ☆221Updated 5 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,328Updated 4 months ago
- Windows Local Privilege Escalation from Service Account to System☆914Updated 5 years ago
- JAWS - Just Another Windows (Enum) Script☆1,915Updated 4 years ago
- ☆2,182Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,776Updated 4 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆685Updated 2 years ago
- Privilege Escalation Enumeration Script for Windows☆3,685Updated last week
- Powershell tool to automate Active Directory enumeration.☆1,279Updated 5 months ago
- A Python based ingestor for BloodHound☆2,335Updated 3 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,077Updated last week
- ☆2,706Updated last year
- Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)☆1,087Updated 4 years ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,335Updated last year