kost / rdpcmd-ruby
Run commands over RDP on massive number of hosts
☆11Updated 6 years ago
Alternatives and similar repositories for rdpcmd-ruby:
Users that are interested in rdpcmd-ruby are comparing it to the libraries listed below
- rev shell and manager in go☆20Updated 5 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Network Finger Printer☆16Updated 7 years ago
- Library of traffic redirectors☆26Updated 4 years ago
- ☆25Updated 6 years ago
- ☆20Updated 6 years ago
- ☆40Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- ☆70Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Enumerate RIDs using pure Python☆31Updated 7 months ago
- Cobalt Strike log state tracking, parsing, and storage☆23Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆21Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 6 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- ☆52Updated 5 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- ☆30Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆32Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 7 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆32Updated 5 years ago