milo2012 / portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
☆165Updated 6 years ago
Related projects: ⓘ
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- Port of eternal blue exploits to powershell☆148Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 6 years ago
- ☆138Updated 7 years ago
- OFFICE DDEAUTO Payload Generation script☆125Updated 3 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆98Updated 6 years ago
- A payload stager using PowerShell☆181Updated 4 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆179Updated 7 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- ☆84Updated this week
- PowerDNS: Powershell DNS Delivery☆211Updated 5 years ago
- Domain user enumeration tool☆212Updated 10 months ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆104Updated 4 years ago
- ☆100Updated 6 years ago
- This project is just a dumping ground for random scripts I've developed.☆137Updated last month
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 5 years ago
- Phishing Template Generation Made Easy☆159Updated 6 years ago
- ☆64Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆207Updated 6 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆159Updated last year
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆126Updated 6 years ago
- An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers.☆300Updated 2 years ago
- ☆132Updated this week
- Some scripts and exploits☆142Updated 6 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆118Updated 10 months ago