zer0-t / RDP-screenshotterLinks
Create a screenshot of a remote desktop because NLA is disabled.
☆39Updated 3 years ago
Alternatives and similar repositories for RDP-screenshotter
Users that are interested in RDP-screenshotter are comparing it to the libraries listed below
Sorting:
- ☆129Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- An epic web shell☆85Updated 2 months ago
- Script for generating hostapd-wpe configuration files and spoofed certificates☆46Updated 8 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆44Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- Username lists that I created.☆17Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- polymorphic webshells☆30Updated 7 years ago
- ☆42Updated 7 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆21Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 10 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 5 years ago