Accenture / AARO-BugsLinks
Vulnerabilities, exploits, and PoCs
☆37Updated 4 months ago
Alternatives and similar repositories for AARO-Bugs
Users that are interested in AARO-Bugs are comparing it to the libraries listed below
Sorting:
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- ☆60Updated 5 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- ☆42Updated 6 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Sustainable shellcode evasion☆111Updated 10 months ago
- ☆108Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆74Updated 3 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- ☆48Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 6 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Updated 4 years ago
- Code Exec via Excel☆88Updated 8 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆49Updated 5 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated 10 months ago
- Simple python script for AD enumeration☆31Updated 4 years ago