Skip to content
View Sh11td0wn's full-sized avatar
🐧
🐧

Block or report Sh11td0wn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. winrm_kerb_shell winrm_kerb_shell Public

    Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very useful with Golden Tickets)

    Ruby 16 2

  2. rpc_brute_enum_users rpc_brute_enum_users Public

    This script connects to a given server via RPC, discovers it's SID and then enumerate the machine / domain users via user SID bruteforce.

    Shell 4 1

  3. winrm_shell winrm_shell Public

    Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine.

    Ruby 1 2

  4. gimmecredz gimmecredz Public

    Forked from 0xmitsurugi/gimmecredz

    You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all passwords from known locations.

    Shell

  5. senhador senhador Public

    Simple password generator

    Python