xorrior / Leviathan
A simple, quick, and dirty websocket shell for PowerShell.
☆20Updated 7 years ago
Alternatives and similar repositories for Leviathan:
Users that are interested in Leviathan are comparing it to the libraries listed below
- Useful Windows and AD tools☆15Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- ☆30Updated 6 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆11Updated 8 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆25Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- ☆22Updated 4 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Scripts to query local admins quickly☆9Updated 8 years ago