Category: Post Exploitation

Shadow Credentials attacks

pywhisker: Python tool for Shadow Credentials attacks

PyWhisker pyWhisker is a Python equivalent of the original Whisker made by Elad Shamir and written in C#. This tool allows users to manipulate the msDS-KeyCredentialLink attribute of a target user/computer to obtain full control...

SSH pivoting

Puwr: SSH pivoting script

Puwr Easily expand your attack surface on a local network by discovering more hosts, via SSH. Using a machine running an SSH service, Puwr uses a given subnet range to...