smokeme / payloadGeneratorLinks
Generate obfuscated meterpreter shells
☆233Updated 4 years ago
Alternatives and similar repositories for payloadGenerator
Users that are interested in payloadGenerator are comparing it to the libraries listed below
Sorting:
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆307Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆447Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆368Updated 5 years ago
- ☆344Updated 4 years ago
- ☆294Updated 4 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆258Updated 3 years ago
- PowerShell scripts for communicating with a remote host.☆306Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆866Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- Hide your payload in DNS☆615Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Updated last month
- Just an AV slayer. Nothing special ;)☆215Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆385Updated last year
- Red Team C code repo☆567Updated 11 months ago
- Maximizing BloodHound. Max is a good boy.☆528Updated 7 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆292Updated 4 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆584Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆501Updated 2 months ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Updated 2 years ago
- Convert shellcode into different formats!☆359Updated 2 years ago
- NTLM relaying for Windows made easy☆578Updated 2 years ago
- Get file less command execution for lateral movement.☆630Updated 3 years ago
- Basic C2 Server☆193Updated 4 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆254Updated 5 years ago
- Bypass AMSI by patching AmsiScanBuffer☆277Updated 4 years ago