smokeme / payloadGenerator
Generate obfuscated meterpreter shells
☆225Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for payloadGenerator
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆816Updated last year
- Red Team C code repo☆513Updated last year
- Get file less command execution for lateral movement.☆603Updated 2 years ago
- ☆332Updated 3 years ago
- Basic C2 Server☆183Updated 3 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆424Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆292Updated last year
- Password spraying and bruteforcing tool for Active Directory Domain Services☆350Updated 3 weeks ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆346Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆502Updated 3 months ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆295Updated 2 years ago
- Assist reverse tcp shells in post-exploration tasks☆214Updated 8 months ago
- ☆500Updated 3 years ago
- Convert shellcode into different formats!☆343Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆413Updated 2 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆270Updated 2 years ago
- NTLM relaying for Windows made easy☆548Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆307Updated last month
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆496Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆613Updated last week
- Manipulating and Abusing Windows Access Tokens.☆267Updated 3 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆197Updated 4 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆431Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆692Updated 3 years ago
- ☆349Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆704Updated 11 months ago