[Collection] Powershell Toolkit For PenTester

PowerMemory: https://github.com/giMini/PowerMemory Exploit the credentials present in files and memory ReflectiveDLLInjection: https://github.com/stephenfewer/ReflectiveDLLInjection Reflective DLL injection is a library injection technique that is primarily used to…

View More [Collection] Powershell Toolkit For PenTester

WinPirate – grabs browser passwords, history, and network passwords on locked computer

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords Download git clone https://github.com/pourquoibenoit/WinPirate.git This project is still in progress Estimated Completion…

View More WinPirate – grabs browser passwords, history, and network passwords on locked computer

Hot Potato – Windows 7,8,10, Server 2008, Server 2012 Privilege Escalation in Metasploit & PowerShell

How Potato works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay…

View More Hot Potato – Windows 7,8,10, Server 2008, Server 2012 Privilege Escalation in Metasploit & PowerShell
Kali Linux 2018.3

Penetration Testing with Kali Linux Methodology

Kali Linux is designed for penetration testing. Whether the penetration tester’s starting point is white-box testing, black-box testing, or gray-box testing, there are always steps…

View More Penetration Testing with Kali Linux Methodology
Share