nodauf / Girsh
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
☆355Updated last year
Alternatives and similar repositories for Girsh:
Users that are interested in Girsh are comparing it to the libraries listed below
- IOXIDResolver.py from AirBus Security☆229Updated last year
- Cobalt Strike random C2 Profile generator☆648Updated 2 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆108Updated last year
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆180Updated 3 years ago
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- ☆291Updated 7 months ago
- ☆506Updated 3 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆271Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆843Updated 2 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆459Updated 2 years ago
- ☆406Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆424Updated last year
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆199Updated 2 months ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆751Updated last year
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆283Updated 2 years ago
- Web shell generator and command line interface.☆84Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆145Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆438Updated last year
- ☆187Updated 4 years ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,065Updated 10 months ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆523Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆424Updated last year
- ☆378Updated 3 years ago
- Amplify network visibility from multiple POV of other hosts☆302Updated 10 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆412Updated last month
- Automatic ProxyShell Exploit☆112Updated 3 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆405Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆361Updated last year