nodauf / Girsh
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
☆353Updated 2 years ago
Alternatives and similar repositories for Girsh:
Users that are interested in Girsh are comparing it to the libraries listed below
- ☆520Updated 3 years ago
- IOXIDResolver.py from AirBus Security☆247Updated last year
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- ☆293Updated 10 months ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆112Updated last year
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Updated 3 years ago
- Cobalt Strike Shellcode Generator☆654Updated 4 months ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆436Updated 2 years ago
- Cobalt Strike random C2 Profile generator☆660Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆198Updated 10 months ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆181Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆366Updated 6 months ago
- ☆407Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆378Updated 2 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆280Updated 2 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆440Updated last year
- grim reaper c2☆337Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆774Updated last year
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆463Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆296Updated 3 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- ☆214Updated 2 years ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆527Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆439Updated last year
- link is a command and control framework written in rust☆576Updated 3 years ago
- A tool for creating hidden accounts using the registry || 一个使用注册表创建隐藏帐户的工具☆468Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆366Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,120Updated 3 weeks ago
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆386Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago