Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.
☆46Oct 26, 2025Updated 4 months ago
Alternatives and similar repositories for Hadoken
Users that are interested in Hadoken are comparing it to the libraries listed below
Sorting:
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆40Feb 1, 2025Updated last year
- Juniper Firewalls CVE-2023-36845 - RCE☆54Dec 29, 2023Updated 2 years ago
- ☆24Nov 18, 2023Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆66Jul 12, 2025Updated 7 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144May 17, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Persistent Powershell backdoor tool {😈}☆121Jul 31, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- CNVD-2023-80853 Apache ActiveMQ < 5.18.3 RCE☆19Oct 27, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- ☆28Jan 19, 2026Updated last month
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆48Jul 28, 2025Updated 7 months ago
- ☆46Oct 27, 2023Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- memory-shell for hook tcp connection and impl origin socks5 proxy☆42Aug 5, 2025Updated 6 months ago
- Vulnerabilities you my miss during a penetration testing.☆97Mar 23, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Dec 24, 2023Updated 2 years ago
- 一款快速全 端口扫描的工具,并获取网站标题、指纹识别结果、WAF判断、是否为后台、状态码判断等功能的IP信息收集工具。☆13Sep 21, 2023Updated 2 years ago