mindcrypt / powerglotLinks
Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, lateral movement, reverse shell, etc.
☆175Updated 5 years ago
Alternatives and similar repositories for powerglot
Users that are interested in powerglot are comparing it to the libraries listed below
Sorting:
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated last week
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- PowerShell payload generator☆118Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆179Updated 4 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆124Updated 3 years ago
- ☆104Updated 6 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- ☆154Updated last week
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- Web-based check for Windows privesc vulnerabilities☆140Updated 2 years ago
- ☆168Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆324Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆65Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- ☆54Updated 7 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- Some random tools I use for penetration testing☆89Updated 3 weeks ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆86Updated 4 years ago