You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*#### `Inveigh` -> Executes Inveigh in a new Console window , SMB-Relay attacks with Session management (Invoke-TheHash) integrated
23
23
*#### `sessionGopher` -> Executes Sessiongopher Asking you for parameters
24
24
*#### `kittielocal` ->
@@ -61,15 +61,10 @@ Functions available after Import:
61
61
*#### `Sharpcradle` -> Load C# Files from a remote Webserver to RAM
62
62
*#### `DomainPassSpray` -> DomainPasswordSpray Attacks, one password for all domain users
63
63
64
-
The submodule is a forked and edited version of https://github.com/Cn33liz/p0wnedShell. You can compile it yourself and use it for powershell restriction bypass and AMSI-Bypass. Most AV-Solutions can be evaded this way. Just run the executable File, choose 17. and execute WinPwn.
-[x] Get the scripts from my own creds repository (https://github.com/S3cur3Th1sSh1t/Creds) to be independent from changes in the original repositories
75
70
-[ ] More Recon/Exploitation functions
@@ -78,7 +73,6 @@ The submodule is a forked and edited version of https://github.com/Cn33liz/p0wne
78
73
-[x] Amsi Bypass
79
74
-[ ] Mailsniper integration
80
75
-[ ] Azure Checks / Modules integration
81
-
-[ ] LAPS Toolkit integration
82
76
83
77
## CREDITS
84
78
@@ -100,6 +94,7 @@ The submodule is a forked and edited version of https://github.com/Cn33liz/p0wne
Usage of WinPwn for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
0 commit comments