☆18Jan 9, 2026Updated 3 months ago
Alternatives and similar repositories for DEFCON-KQL-KUNG-FU-22
Users that are interested in DEFCON-KQL-KUNG-FU-22 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Windows Hardening Powershell Scripts☆25Oct 3, 2025Updated 6 months ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Mar 27, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- KQL Queries☆34Mar 19, 2026Updated last month
- ☆28Feb 6, 2024Updated 2 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year
- Share files of any size with Chirp and dat☆12Oct 5, 2020Updated 5 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 5 months ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- ☆14Aug 21, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Jan 23, 2020Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 8 years ago
- ☆38Jan 6, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Dec 26, 2022Updated 3 years ago
- ☆15Sep 19, 2019Updated 6 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- KQL example queries for working in Azure☆37Dec 1, 2025Updated 4 months ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- Yet another shellcode loader - but a sneaky one☆26Apr 16, 2025Updated last year
- Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587☆42Mar 14, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Mar 14, 2022Updated 4 years ago
- Content related to medium.com/@thatsiemguy☆19Nov 16, 2025Updated 5 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Dec 12, 2024Updated last year
- ☆33Jan 3, 2023Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago