4ndr34z / prenumView external linksLinks
☆29May 16, 2023Updated 2 years ago
Alternatives and similar repositories for prenum
Users that are interested in prenum are comparing it to the libraries listed below
Sorting:
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Payload Generation Framework☆20Oct 24, 2024Updated last year
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 2 months ago
- ☆198Jan 18, 2023Updated 3 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- Automated exploitation of MSSQL servers at scale☆127Feb 4, 2026Updated last week
- ☆38Apr 7, 2023Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 9 months ago
- Lateral Movement☆125Nov 14, 2023Updated 2 years ago
- Winsocket for Cobalt Strike.☆102Jul 6, 2023Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66May 1, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- ☆16Jan 12, 2026Updated last month
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆366Dec 23, 2025Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Jan 15, 2025Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆15Oct 30, 2024Updated last year
- Execute shellcode files with rundll32☆216Jan 28, 2024Updated 2 years ago