CroodSolutions / BypassIT
BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.
☆12Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for BypassIT
- Microsoft Office365 Protection Center Audit Log Parser☆25Updated last year
- Semantic analysis with neural networks☆10Updated 3 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆10Updated 2 years ago
- ☆11Updated 7 months ago
- ☆15Updated 2 weeks ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆13Updated 5 months ago
- ☆165Updated last year
- 📕 My collection of notes for the eJPT certification.☆57Updated 3 years ago
- ☆19Updated 2 years ago
- study material used for the 2018 CISSP exam☆11Updated 6 years ago
- This is the Splunk App integrated with Tanium☆10Updated 7 years ago
- Splunk Technology Add-On for pfsense☆11Updated 2 years ago
- ☆16Updated 2 years ago
- This repository contains writeups for Damn Vulnerable Web Application (DVWA).☆20Updated 2 months ago
- This repository contains a collection of important notes and commands for the Certified Ethical Hacker (CEH) practical exam. Aspiring CEH…☆116Updated 4 months ago
- A collection of PHP backdoors. For educational or testing purposes only.☆15Updated 6 years ago
- Exchange Reporter creates email reports with statistics for Exchange Server☆17Updated 2 months ago
- ☆15Updated last week
- Are you rugged?☆82Updated 3 years ago
- Wanna TesT YoUr CyberSecurity Skills Below are the amazing platforms to level-up yourself☆15Updated 2 years ago
- ☆16Updated 7 months ago
- A repository of various login portal html pages that send the captured information to a Discord webhook.☆21Updated 7 months ago
- Open source documentation of Microsoft Azure☆14Updated 5 years ago
- This Repository will contain an updated list of Tech books across various fields☆27Updated 6 months ago
- TFTP client and server implementation in Python☆12Updated 6 years ago
- Automates The Setup of Exchange Accounts☆14Updated 9 years ago
- All about bug bounty (bypasses, payloads, and etc)☆5,863Updated last year
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆15Updated last year
- System Promp Lists for Google's Gemini AI☆6Updated 3 months ago