Category: Post Exploitation
NoPowerShell NoPowerShell is a tool implemented in C# which supports executing PowerShell-like commands while remaining invisible to any PowerShell logging mechanisms. This .NET Framework 2 compatible binary can be loaded...
PowerHub PowerHub is a web application which aids a pentester in transferring files, in particular, code which may get flagged by endpoint protection. During an engagement where you have a...
0xsp Mongoose Linux Privilege Escalation intelligent Enumeration Toolkit 0xsp mongoose red version is provided to assist your needs during cyber security simulation, by using this version you will be able...
Mimikatz is an open-source gadget written in C, launched in April 2014. It is very powerful, support from the Windows system memory to extract clear text password, hash, PIN code,...
Active Directory Assessment and Privilege Escalation (ADAPE) Script This script will do the following: • Gather hashes via WPAD, LLMNR, and NBT-NS spoofing • Check for GPP password (MS14-025) •...
LinEnum – Scripted Local Linux Enumeration & Privilege Escalation Checks For more information visit www.rebootuser.com Note: Export functionality is currently in the experimental stage. High-level summary of the checks/tasks performed by LinEnum:...
Log-killer Log Killer is a tool for [Linux/Windows] Servers. This tool will delete all your logs, just download the tool and run it on the server. If your server OS...
WinPwn Automation for internal Windows Penetration Testing. 1) Automatic Proxy Detection 2) Elevated or unelevated Detection 3) Forensic Mode oder Pentest Mode a. Forensik -> Loki + PSRECON + Todo:...
DSInternals PowerShell Module and Framework The DSInternals project consists of these two parts: The DSInternals Framework exposes several internal features of Active Directory and can be used from any .NET application. The codebase has...
zBang is a special risk assessment tool that detects potential privileged account threats in the scanned network. Organizations and red teamers can utilize zBang to identify potential attack vectors and...
Krbrelayx – Unconstrained delegation abuse toolkit Toolkit for abusing unconstrained delegation. Requires impacket and ldap3 to function. It is recommended to install impacket from git directly to have the latest version available. Download git...
uptux Privilege escalation checks for Linux systemd. This tool checks for issues on Linux systems that may lead to privilege escalation. The core focus in on systemd configuration. This tool...
UACMe Defeating Windows User Account Control by abusing the built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10/11 (client, some methods, however, works on server version too). Admin account with...
THRecon THRecon -Threat Hunting Reconnaissance Toolkit- A collection of PowerShell modules designed for artifact gathering and reconnaissance of Windows-based endpoints. Use cases include incident response triage, threat hunting, baseline monitoring,...
Red Team Powershell Scripts Various PowerShell scripts that may be useful during a red team exercise Download git clone https://github.com/Mr-Un1k0d3r/RedTeamPowershellScripts.git The repo includes the script as below: Search-EventForUser.ps1: Powershell script...