pwncat
pwncat copied to clipboard
Fancy reverse and bind shell handler
## Bug Description @mgeddert reported this issue within another issue and via E-mail directly to me. Roughly speaking, the attacker is attempting to load the PowerSploit Recon powershell modules in...
## Bug Description At one point in the past, the `gtfobins` module supported both "printable", "raw" and "base64" streams. The intent was that some commands may not be able to...
## Description of Changes The `base64` stream type in `gtfobins.json` is no longer valid, but there were entries left behind using it. This pull request is meant to remove all...
## Description of Changes Ran into an issue where `upload ~/file.txt /tmp/file.txt` errored out on me. Looking into this, I found pwncat doesn't support the home directory prefix. This is...
First of all, I wanna say that pwncat is awesome, this tool really impressed me when I discovered it However this time, I'm using pwncat to listen a jsp reverse...
## Feature Description Currently, all open sessions have to be managed in the terminal windows in which they were created. It would be amazing if the user would be able...
Hey! I wanted to get this to you as soon as possible. Here is where it is at right now. - As noted in the commit message, this has not...
## Description of Changes Fixes #128. This pull request implements the remaining Windows Privilege Escalation modules tracked in #128. ## Major Changes Implemented: - - - ## Pre-Merge Tasks -...
**Is your feature request related to a problem? Please describe.** No. **Describe the solution you'd like** We need to implement a full compliment of baseline windows enumerations. A good start...
## Is the feature related to a problem? No. ## Feature Description The next Windows Privilege Escalation module we could implement is taking advantage of the `AlwaysInstallElevated` configuration and registry...