mrfuzzy8 / ScriptsLinks
☆13Updated 9 years ago
Alternatives and similar repositories for Scripts
Users that are interested in Scripts are comparing it to the libraries listed below
Sorting:
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- ☆19Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- AV Bypass☆29Updated 8 years ago
- SysCon14 release☆55Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33Updated last year
- Oracle Attacks Tool☆13Updated 9 years ago
- ☆17Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 9 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- ☆83Updated 10 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- Generates several metasploit payloads☆15Updated 7 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 5 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 8 years ago
- PIC code gen and loading☆13Updated 8 years ago
- ☆41Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago