xct / xc
A small reverse shell for Linux & Windows
☆598Updated 10 months ago
Alternatives and similar repositories for xc:
Users that are interested in xc are comparing it to the libraries listed below
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated 7 months ago
- An script to perform kerberos bruteforcing by using impacket☆444Updated 3 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆612Updated 4 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆621Updated 3 years ago
- Windows AV Evasion☆771Updated 5 years ago
- Windows Local Privilege Escalation from Service Account to System☆788Updated 5 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,073Updated 4 years ago
- ☆216Updated 4 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆866Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,117Updated 10 months ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆277Updated last year
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆374Updated 4 months ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,098Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,298Updated last week
- ☆208Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆439Updated 4 months ago
- Kerberos unconstrained delegation abuse toolkit☆1,276Updated 2 months ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,158Updated 4 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆973Updated last month
- The Hunt for Malicious Strings☆1,192Updated 2 years ago
- Linux PAM Backdoor☆327Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆516Updated 2 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆706Updated last month
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆529Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆375Updated 4 years ago
- Standalone binaries for Linux/Windows of Impacket's examples☆727Updated last year
- Active Directory Integrated DNS dumping by any authenticated user☆994Updated 2 weeks ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆381Updated 4 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆912Updated 10 months ago
- ☆275Updated 3 years ago