nodauf / GirshLinks
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
☆355Updated 2 years ago
Alternatives and similar repositories for Girsh
Users that are interested in Girsh are comparing it to the libraries listed below
Sorting:
- IOXIDResolver.py from AirBus Security☆250Updated last year
- ☆293Updated 11 months ago
- ☆521Updated 3 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆438Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆422Updated 5 months ago
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆114Updated last year
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆779Updated last year
- Proof of Concept Exploit for vCenter CVE-2021-21972☆260Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆440Updated last year
- ☆214Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆465Updated 2 years ago
- Web shell generator and command line interface.☆84Updated 4 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆445Updated last year
- ☆408Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆301Updated 3 years ago
- Cobalt Strike random C2 Profile generator☆660Updated 2 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆281Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆226Updated 5 months ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆182Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆886Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆749Updated 4 years ago
- Local privilege escalation from SeImpersonatePrivilege using EfsRpc.☆323Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆865Updated 2 years ago
- NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473☆162Updated 3 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,133Updated last month
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆454Updated last year
- Cobalt Strike Shellcode Generator☆655Updated 4 months ago