Skip to content
View Sh11td0wn's full-sized avatar
🐧
🐧

Block or report Sh11td0wn

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
  • Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very useful with Golden Tickets)

    Ruby 18 3 Updated Sep 7, 2019
  • winrm_shell Public

    Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine.

    Ruby 1 1 Updated Sep 7, 2019
  • This script connects to a given server via RPC, discovers it's SID and then enumerate the machine / domain users via user SID bruteforce.

    Shell 4 Updated Sep 4, 2019
  • senhador Public

    Simple password generator

    Python Updated Aug 13, 2019
  • You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all passwords from known locations.

    Shell Updated Jun 1, 2019