Remote Task Scheduler Enumeration
☆13Jul 9, 2024Updated last year
Alternatives and similar repositories for taskpwn
Users that are interested in taskpwn are comparing it to the libraries listed below
Sorting:
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Obfuscate and run .exe files in a powershell script☆18Apr 2, 2023Updated 2 years ago
- purplestorm writeup collection☆29Feb 21, 2026Updated last week
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 7 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆10Oct 1, 2019Updated 6 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 3 weeks ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- ☆14May 14, 2022Updated 3 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆12Mar 17, 2025Updated 11 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- ☆16Aug 25, 2025Updated 6 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- ASCII-ART to make someone smile ♡☆11Jul 3, 2022Updated 3 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- ☆12Feb 7, 2023Updated 3 years ago
- ☆12Aug 25, 2023Updated 2 years ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- ☆13Feb 22, 2024Updated 2 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago