github_repos

GITHUB REPOS Sharpup-Privesc - https://github.com/GhostPack/SharpUp.gitarrow-up-right SharpView - https://github.com/tevora-threat/SharpView.gitarrow-up-right SharpCOM - https://github.com/rvrsh3ll/SharpCOM.gitarrow-up-right Goddi - https://github.com/NetSPI/goddi.gitarrow-up-right Rubeus - https://github.com/GhostPack/Rubeus.gitarrow-up-right Sharphound - https://github.com/BloodHoundAD/SharpHound.gitarrow-up-right Sharp-InvokeWMIExec - https://github.com/checkymander/Sharp-WMIExec.gitarrow-up-right Invoke-Thehash - https://github.com/Kevin-Robertson/Invoke-TheHash.gitarrow-up-right ClipboardMonitor - https://github.com/mrousavy/ClipboardMonitor.gitarrow-up-right Keethief - https://github.com/HarmJ0y/KeeThief.gitarrow-up-right DNSrecon - https://github.com/darkoperator/dnsrecon.gitarrow-up-right Seatbelt - https://github.com/GhostPack/Seatbelt.gitarrow-up-right Internal Monologue - https://github.com/eladshamir/Internal-Monologue.gitarrow-up-right LAPS tools - https://github.com/ztrhgf/LAPSarrow-up-right

Privesc [>] https://www.rythmstick.net/posts/cve-2019-1064/arrow-up-right

[!] CVE-2019-1130 : VULNERABLE [>] https://github.com/S3cur3Th1sSh1t/SharpByeBeararrow-up-right

[!] CVE-2019-1253 : VULNERABLE [>] https://github.com/padovah4ck/CVE-2019-1253arrow-up-right

[!] CVE-2019-1315 : VULNERABLE [>] https://offsec.almond.consulting/windows-error-reporting-arbitrary-file-move-eop.htmlarrow-up-right

https://github.com/swisskyrepo/PayloadsAllTheThings/arrow-up-right

New Windows Exploit Suggestor - https://github.com/bitsadmin/wesngarrow-up-right

https://github.com/PowerShell/GPRegistryPolicyParserarrow-up-right

https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txtarrow-up-right

SharpWeb - .NET 2.0 CLR project to retrieve saved browser credentials - https://github.com/djhohnstein/SharpWebarrow-up-right reconerator - C# Targeted Attack Reconnissance Tools - https://github.com/stufus/reconeratorarrow-up-right SafetyKatz - create a minidump of LSASS - https://github.com/GhostPack/SafetyKatzarrow-up-right SharpShooter - framework for the retrieval and execution of arbitrary CSharp source code - https://github.com/mdsecactivebreach/SharpShooterarrow-up-right SharpCradle - download and execute .NET binaries into memory - https://github.com/anthemtotheego/SharpCradlearrow-up-right Sharp-WMIExec - C# conversion of Invoke-WMIExec - https://github.com/checkymander/Sharp-WMIExecarrow-up-right Sharp-SMBExec - C# conversion of Invoke-SMBExec https://github.com/checkymander/Sharp-SMBExecarrow-up-right SharpCloud - Collecting AWS, Microsoft Azure, and Google Compute creds - https://github.com/chrismaddalena/SharpCloudarrow-up-right SharpView - C# implementation of PowerView - https://github.com/tevora-threat/SharpViewarrow-up-right SharpHound - The BloodHound C# Ingestor - https://github.com/BloodHoundAD/SharpHounarrow-up-right SharpGen - C# compiler to cross-compile .NET console applications or libraries. - https://github.com/cobbr/SharpGenarrow-up-right InveighZero - C# LLMNR/NBNS spoofer - https://github.com/Kevin-Robertson/InveighZeroarrow-up-right SharpSploitConsole - Console Application designed to interact with SharpSploit - https://github.com/anthemtotheego/SharpSploitConsolearrow-up-right SharpSniper - Find specific users in active directory via username and IP address - https://github.com/HunnicCyber/SharpSniperarrow-up-right SharPersist - Windows persistence toolkit - https://github.com/fireeye/SharPersistarrow-up-right RedTeamCSharpScripts - C# Script used for Red Team - https://github.com/Mr-Un1k0d3r/RedTeamCSharpScriptsarrow-up-right SharPyShell - iny and obfuscated ASP.NET webshell for C# - https://github.com/antonioCoco/SharPyShellarrow-up-right

pacu - The AWS exploitation framework - https://github.com/RhinoSecurityLabs/pacuarrow-up-right weirdAAL - AWS Attack Library - https://github.com/carnal0wnage/weirdAALarrow-up-right ScoutSuite - Multi-Cloud Security Auditing Tool - https://github.com/nccgroup/ScoutSuitearrow-up-right AWS-IAM-Privilege-Escalation - AWS IAM privilege escalation methods - https://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalationarrow-up-right nimbostratus - ingerprinting and exploiting Amazon cloud infrastructures - https://github.com/andresriancho/nimbostratusarrow-up-right

Last updated

Was this helpful?