xct / xc
A small reverse shell for Linux & Windows
☆596Updated 9 months ago
Alternatives and similar repositories for xc:
Users that are interested in xc are comparing it to the libraries listed below
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆602Updated 6 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆600Updated 4 years ago
- Windows Local Privilege Escalation from Service Account to System☆762Updated 5 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,087Updated 9 months ago
- The Hunt for Malicious Strings☆1,173Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆619Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆901Updated 9 months ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,085Updated 2 years ago
- An script to perform kerberos bruteforcing by using impacket☆444Updated 2 years ago
- Windows AV Evasion☆762Updated 4 years ago
- Python version of the C# tool for "Shadow Credentials" attacks☆681Updated 2 weeks ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,072Updated 4 years ago
- ☆214Updated 4 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆339Updated 6 months ago
- ☆657Updated last month
- A (partial) Python rewriting of PowerSploit's PowerView☆953Updated 2 weeks ago
- ☆1,573Updated 8 months ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆765Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,368Updated 2 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆850Updated 2 years ago
- Kerberos unconstrained delegation abuse toolkit☆1,258Updated last month
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,049Updated 6 months ago
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,124Updated 8 months ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆951Updated 2 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆274Updated last year
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆369Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,270Updated 7 months ago
- Powershell tool to automate Active Directory enumeration.☆1,071Updated 2 weeks ago
- Some notes and examples for cobalt strike's functionality☆1,008Updated 3 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,125Updated 4 years ago