xct / xcLinks
A small reverse shell for Linux & Windows
☆607Updated last year
Alternatives and similar repositories for xc
Users that are interested in xc are comparing it to the libraries listed below
Sorting:
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆607Updated 9 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆619Updated 5 years ago
- Windows Local Privilege Escalation from Service Account to System☆816Updated 5 years ago
- An script to perform kerberos bruteforcing by using impacket☆451Updated 3 years ago
- ☆217Updated 4 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,096Updated 4 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,163Updated last year
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆626Updated 3 years ago
- Windows AV Evasion☆792Updated 5 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,345Updated 2 months ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,123Updated 2 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆379Updated 7 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆754Updated 2 months ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆280Updated 2 years ago
- Linux PAM Backdoor☆336Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,143Updated 4 months ago
- Pentester's Promiscuous Notebook☆497Updated last week
- Simple php reverse shell implemented using binary .☆419Updated last year
- The Hunt for Malicious Strings☆1,235Updated last month
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,197Updated 4 years ago
- Kerberoast with ACL abuse capabilities☆499Updated 6 months ago
- ☆211Updated 4 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,008Updated 3 months ago
- Powershell tool to automate Active Directory enumeration.☆1,123Updated 2 weeks ago
- PHP shells that work on Linux OS, macOS, and Windows OS.☆493Updated last year
- RunasCs - Csharp and open version of windows builtin runas.exe☆1,189Updated 11 months ago
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,337Updated 4 months ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆888Updated 3 years ago
- ☆693Updated 4 months ago
- Some notes and examples for cobalt strike's functionality☆1,089Updated 3 years ago