Post-exploitation scripts for OS X persistence and privesc
☆73Apr 12, 2017Updated 8 years ago
Alternatives and similar repositories for pOSt-eX
Users that are interested in pOSt-eX are comparing it to the libraries listed below
Sorting:
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- A PowerShell script to download all files, messages and user profiles that a user has access to in slack.☆156Oct 30, 2020Updated 5 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Chameleon: A tool for evading Proxy categorisation☆512Nov 28, 2024Updated last year
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A proof of concept for the RDP Inception Attack☆353Jun 29, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago