smridhgupta / alpha-wpes
Windows Privilege Escalation Tool
☆18Updated last year
Alternatives and similar repositories for alpha-wpes:
Users that are interested in alpha-wpes are comparing it to the libraries listed below
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- Offensive Powershell obfuscator☆25Updated 6 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 8 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 3 months ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago
- Most Responder's configuration power in your hand.☆47Updated 2 months ago
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆9Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- Tools used for Pentesting☆22Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- Public repo of some woking evilginx phishlets☆31Updated 4 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 2 months ago
- ☆26Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆106Updated 2 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆18Updated last week
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆12Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆46Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 6 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- Utilities for obfuscating shellcode☆57Updated 2 weeks ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- My Favorite Offensive Security Scripts☆69Updated last year