xorrior / LeviathanLinks
A simple, quick, and dirty websocket shell for PowerShell.
☆20Updated 8 years ago
Alternatives and similar repositories for Leviathan
Users that are interested in Leviathan are comparing it to the libraries listed below
Sorting:
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆11Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- ☆30Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 8 months ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- ☆25Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆71Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆48Updated 5 years ago