A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phishing campaigns, extrapolate hidden data such as subdomains, security identifers, usernames and encrypted passwords; utilise pass the hash techniques, crack and auto import ntds.dit files, create on-demand golde…
☆16Jan 18, 2026Updated 2 months ago
Alternatives and similar repositories for ROGUE-AGENT
Users that are interested in ROGUE-AGENT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- ☆36Oct 6, 2021Updated 4 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Jan 27, 2024Updated 2 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46May 3, 2021Updated 4 years ago
- Chat Bot Security Checklist☆31Jul 4, 2019Updated 6 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 3 years ago
- Open browser window and set proxy☆12Oct 13, 2020Updated 5 years ago
- ☆11Mar 7, 2021Updated 5 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Mar 4, 2021Updated 5 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Determine if an email address exists or not on ProtonMail with NeutrOSINT☆34Dec 14, 2025Updated 3 months ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pixel Workplace is a simple virtual environment to simulate the lack of real life office spaces.☆11Mar 4, 2023Updated 3 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆20Jun 23, 2024Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- A web UI for generating Linux images for Ethereum homestaking☆11Mar 10, 2026Updated 2 weeks ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- Provides an Invoice Payment Gateway, mainly for B2B segment where instant payment via PayPal etc. is not a viable option.☆12Apr 7, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NodeJS SDK for Whalestack. Programmatically accept and settle payments in digital currencies.☆11Nov 7, 2023Updated 2 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- GPT fdisk partitioning tool for use under UEFI environments.☆17Nov 27, 2024Updated last year
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- VMWare vRealize SSRF-CVE-2021-21975☆14Apr 2, 2021Updated 4 years ago
- Scripts to deal with OVH Servers☆15Oct 13, 2012Updated 13 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago