smokeme / payloadGeneratorLinks
Generate obfuscated meterpreter shells
☆234Updated 4 years ago
Alternatives and similar repositories for payloadGenerator
Users that are interested in payloadGenerator are comparing it to the libraries listed below
Sorting:
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆369Updated 5 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆311Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Updated 2 years ago
- ☆347Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆866Updated 2 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆258Updated 4 years ago
- ☆296Updated 4 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Updated 2 months ago
- Hide your payload in DNS☆615Updated 2 years ago
- Convert shellcode into different formats!☆360Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- PowerShell scripts for communicating with a remote host.☆303Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆603Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- Maximizing BloodHound. Max is a good boy.☆530Updated 8 months ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆384Updated last year
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆254Updated 5 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- SMBGhost (CVE-2020-0796) Automate Exploitation and Detection☆337Updated 3 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- Get file less command execution for lateral movement.☆630Updated 3 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- A unique technique to execute binaries from a password protected zip☆1,041Updated 3 years ago
- Red Team C code repo☆569Updated last year
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 4 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆331Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆501Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- A polyglot payload generator☆242Updated 3 years ago