AssuranceMaladieSec / FoxTerrierView external linksLinks
Python tool to find vulnerable AD object and generating csv report
☆26Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for FoxTerrier
Users that are interested in FoxTerrier are comparing it to the libraries listed below
Sorting:
- ☆15Feb 9, 2022Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Oct 10, 2022Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- ☆22May 29, 2020Updated 5 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆39Oct 6, 2021Updated 4 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- cloud-based interactive security exercises☆14Jul 13, 2020Updated 5 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- ☆26May 22, 2021Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- all credits go to @mgeeky☆64Oct 14, 2021Updated 4 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated last year
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- ☆13Jan 20, 2020Updated 6 years ago
- Piece of code to detect and remove hooks in IAT☆65May 30, 2022Updated 3 years ago
- ☆385Jan 19, 2023Updated 3 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated 2 weeks ago