nodauf / Girsh
Automatically spawn a reverse shell fully interactive for Linux or Windows victim
☆353Updated 2 years ago
Alternatives and similar repositories for Girsh:
Users that are interested in Girsh are comparing it to the libraries listed below
- IOXIDResolver.py from AirBus Security☆241Updated last year
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆273Updated 3 years ago
- ☆518Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆429Updated 2 years ago
- Web shell generator and command line interface.☆84Updated 4 years ago
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆112Updated last year
- ☆293Updated 9 months ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆180Updated 3 years ago
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆436Updated last year
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆177Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆140Updated 2 years ago
- Cobalt Strike random C2 Profile generator☆656Updated 2 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆860Updated 2 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆769Updated last year
- ☆406Updated 2 years ago
- Amplify network visibility from multiple POV of other hosts☆302Updated last year
- A tool to make socks connections through HTTP agents☆696Updated 4 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆384Updated 2 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆437Updated last year
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆198Updated 9 months ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆440Updated last year
- A super small jsp webshell with file upload capabilities.☆293Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆843Updated 2 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆421Updated 3 months ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆740Updated 4 years ago
- A tool for collecting RDP, web and VNC screenshots all in one place☆465Updated 2 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆295Updated 3 years ago