☆86Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for WonkaVision
Users that are interested in WonkaVision are comparing it to the libraries listed below
Sorting:
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Aug 4, 2025Updated 6 months ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- ☆162Mar 27, 2023Updated 2 years ago
- Collection of tools to use with Azure Applications☆112Oct 13, 2023Updated 2 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- ☆57Apr 19, 2023Updated 2 years ago
- ☆223Oct 22, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- ☆129Mar 1, 2023Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 11 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- ☆29May 10, 2024Updated last year
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆360Mar 2, 2024Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated last year
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- ☆383Jan 19, 2023Updated 3 years ago
- ☆181Dec 16, 2022Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago