DLL to open up calc.exe to demonstrate that you injected DLLs
☆24Nov 29, 2020Updated 5 years ago
Alternatives and similar repositories for PopCalc
Users that are interested in PopCalc are comparing it to the libraries listed below
Sorting:
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆18Sep 20, 2024Updated last year
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆125Apr 9, 2022Updated 3 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago
- golang 版本的 nc ,支持平时使用的大部分功能,并增加了流量rc4加密☆38Nov 18, 2020Updated 5 years ago
- 暴力破解cs的teamserver密码脚本☆38Dec 1, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆11Oct 17, 2024Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- DuckyTails is a interpreter that runs Ducky Scripts from any pendrive. You don't need a USB Rubber Ducky☆12Sep 29, 2018Updated 7 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- Hosting PowerShell in Python☆43Jun 17, 2022Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- 🔑 A service which provides continuous user authentication to web applications, using keystroke dynamics.☆12Oct 24, 2018Updated 7 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- 自写的src开源脚本☆19Feb 17, 2025Updated last year
- ☆11Dec 25, 2020Updated 5 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 8 years ago
- pathscanner☆14Jun 5, 2015Updated 10 years ago
- ☆20Jan 12, 2022Updated 4 years ago