GhnimiWael / LDAPHunterView external linksLinks
LDAP Enumeration Tool for Pentesters
☆48Apr 22, 2025Updated 9 months ago
Alternatives and similar repositories for LDAPHunter
Users that are interested in LDAPHunter are comparing it to the libraries listed below
Sorting:
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆23Jan 27, 2026Updated 2 weeks ago
- ☆16Oct 21, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- ☆23Apr 28, 2024Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆69Aug 10, 2025Updated 6 months ago
- ☆34Jul 31, 2024Updated last year
- ☆12Dec 26, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- ☆20Sep 6, 2025Updated 5 months ago
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Apr 1, 2025Updated 10 months ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆47Aug 20, 2025Updated 5 months ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆11Mar 7, 2021Updated 4 years ago
- Ludus range for the Constructing Defense Lab☆74Nov 10, 2025Updated 3 months ago
- CVE-2022-21587 POC☆15Feb 17, 2023Updated 2 years ago
- Self-mutating macOS implant☆121Dec 18, 2025Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- bring your own clean ntdll (or other MS dlls)☆28Jul 14, 2025Updated 7 months ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆78Aug 25, 2025Updated 5 months ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 5, 2025Updated 11 months ago
- C2 Infrastructure Automation☆118Jun 21, 2025Updated 7 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 8 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆19Dec 3, 2024Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- BOF to decrypt Signal Desktop chat logs☆72Feb 20, 2025Updated 11 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Aug 21, 2025Updated 5 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Mar 2, 2025Updated 11 months ago
- ☆74Jun 17, 2025Updated 7 months ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago