DarwinSec / DEFCON-KQL-KUNG-FU-22View external linksLinks
☆18Jan 9, 2026Updated last month
Alternatives and similar repositories for DEFCON-KQL-KUNG-FU-22
Users that are interested in DEFCON-KQL-KUNG-FU-22 are comparing it to the libraries listed below
Sorting:
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- ☆27Feb 6, 2024Updated 2 years ago
- D2R MapHack☆10Jun 10, 2022Updated 3 years ago
- A collection of various exploits☆28Sep 17, 2024Updated last year
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- ☆38Jan 6, 2025Updated last year
- ☆33Jan 3, 2023Updated 3 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆17Dec 22, 2025Updated last month
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- Skillets is the default holding place for useful Panhandler skillets. These are usually smaller one-off bits that may not require their o…☆13Apr 15, 2020Updated 5 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- Scripts to enumerate and report on Entra Conditional Access☆41Sep 5, 2025Updated 5 months ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 9 months ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Build interactive CLI menus in Powershell☆38Nov 28, 2022Updated 3 years ago
- ☆38Jan 13, 2023Updated 3 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 4 months ago
- ☆12Dec 15, 2024Updated last year
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago