☆19May 31, 2017Updated 8 years ago
Alternatives and similar repositories for PSUnlock
Users that are interested in PSUnlock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Apr 5, 2017Updated 8 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Use CLR to inject all the .NET apps☆185Apr 17, 2021Updated 4 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Aug 4, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- IR-Tools - PowerShell tools for IR☆130Jul 10, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- ☆163Aug 28, 2015Updated 10 years ago