Python tool to find vulnerable AD object and generating csv report
☆26Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for FoxTerrier
Users that are interested in FoxTerrier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- ☆22May 29, 2020Updated 5 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆26May 22, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- Piece of code to detect and remove hooks in IAT☆65May 30, 2022Updated 3 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- ☆52Feb 8, 2024Updated 2 years ago
- Process Injection: APC Injection☆33Jan 13, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- You wonder how to manage your travelers ? In this scenario we describe how to manage them with Identity Governance and Conditional Access…☆11Mar 20, 2024Updated 2 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆15Mar 27, 2025Updated last year
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- ☆382Jan 19, 2023Updated 3 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Sep 20, 2024Updated last year
- A technique of hiding malicious shellcode via Shannon encoding.☆265Oct 23, 2022Updated 3 years ago