Category: Post Exploitation

Inveigh

Inveigh v1.4 releases: Windows PowerShell LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool

Inveigh is a PowerShell LLMNR/mDNS/NBNS spoofer and man-in-the-middle tool designed to assist penetration testers/red teamers that find themselves limited to a Windows system. Included In PowerShell Empire – https://github.com/PowerShellEmpire/Empire PS>Attack – https://github.com/jaredhaight/psattack p0wnedShell – https://github.com/Cn33liz/p0wnedShell PowerUpSQL – https://github.com/NetSPI/PowerUpSQL...

MIDA-Multitool

MIDA-Multitool: system enumeration, vulnerability identification and privilege escalation

MIDA-Multitool – Bash script purposed for system enumeration, vulnerability identification, and privilege escalation.MIDA Multitool draws functionality from several of my previous scripts namely SysEnum and RootHelper and is in many regards RootHelpers successor. Besides functionality from these two previous...

ibombshell

ibombshell: Dynamic Remote Shell

ibombshell – Dynamic Remote Shell ibombshell is a tool written in Powershell that allows you to have a prompt at any time with post-exploitation functionalities (and in some cases exploitation). It is a shell that...

UACME

UACME v3.0 releases: Defeating Windows User Account Control

UACMe Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods, however, works on server version too). Admin account with UAC set on default settings...