kost / rdpcmd-ruby
Run commands over RDP on massive number of hosts
☆11Updated 6 years ago
Alternatives and similar repositories for rdpcmd-ruby:
Users that are interested in rdpcmd-ruby are comparing it to the libraries listed below
- ☆20Updated 6 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Network Finger Printer☆16Updated 7 years ago
- rev shell and manager in go☆20Updated 4 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆23Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 5 years ago
- Library of traffic redirectors☆26Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- ☆58Updated 7 years ago
- ☆40Updated 6 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago
- Enumerate RIDs using pure Python☆31Updated 6 months ago
- Helper script for mangling CS payloads☆52Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆21Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Discover MSSQL Instances via UDP Scanning☆23Updated 6 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- ☆25Updated 6 years ago
- ☆70Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆31Updated 9 months ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆58Updated 5 years ago
- AV Bypass☆29Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago