starksimilarity / msf_prompt
Python emulator of msfconsole
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for msf_prompt
- The best way to send emails in Go.☆10Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆18Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- C2 and Post Exploitation Code☆34Updated last month
- SSDP Service Discovery☆16Updated 5 years ago
- Simple C2 over the Trello API☆37Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆13Updated 7 years ago
- ☆16Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- ☆15Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 3 years ago