Creating attacks paths across management and data planes
☆48Apr 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for cirro
Users that are interested in cirro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆25Aug 2, 2025Updated 8 months ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆16Feb 27, 2024Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆41Dec 5, 2025Updated 4 months ago
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆80Oct 27, 2025Updated 6 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆345Apr 18, 2026Updated last week
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 4 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 6 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 9 months ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆21Mar 28, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 8 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 5 months ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Bring runZero Exposure Management into BloodHound☆47Apr 16, 2026Updated last week
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 4 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆90Jul 28, 2022Updated 3 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- ☆53Sep 16, 2021Updated 4 years ago
- ☆49Apr 9, 2025Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- top usernames from azure survey 2025☆16Apr 25, 2025Updated last year
- ☆164May 5, 2025Updated 11 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆24Jun 14, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆23Updated this week
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 3 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 3 months ago
- The DCERPC only printerbug.py version☆217Oct 30, 2025Updated 5 months ago