smridhgupta / alpha-wpesLinks
Windows Privilege Escalation Tool
☆18Updated last year
Alternatives and similar repositories for alpha-wpes
Users that are interested in alpha-wpes are comparing it to the libraries listed below
Sorting:
- Offensive Powershell obfuscator☆27Updated 11 months ago
- C2 Server for pentesting, exploitation, and payload creation☆12Updated last year
- ☆105Updated 10 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆177Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆114Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆56Updated 7 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Updated 9 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆49Updated 3 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆93Updated last year
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆99Updated 3 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆134Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 7 months ago
- A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.☆17Updated last year
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Generate FUD backdoors☆249Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆206Updated 4 months ago