Category: Exploitation

unicorn

Unicorn v3.5.3 released: PowerShell downgrade attack

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and...

LAPSToolkit

LAPSToolkit: audit and attack LAPS environments

LAPSToolkit Functions are written in PowerShell that leverage PowerView to audit and attack Active Directory environments that have deployed Microsoft’s Local Administrator Password Solution (LAPS). It includes finding groups specifically delegated by sysadmins, finding...

jok3r

jok3r v2.0 releases: Network & Web Hacking Arsenal Manager

Jok3r – Network and Web Pentest Framework Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests. Its main goal is to save time on everything...

relayer

relayer: SMB Relay Attack Script

Relayer – SMB Relay Attack Script. Relayer is an SMB relay Attack Script that automates all the necessary steps to scan for systems with SMB signing disabled and relaying authentication request to these systems...