LDAP Enumeration Tool for Pentesters
☆48Apr 22, 2025Updated 10 months ago
Alternatives and similar repositories for LDAPHunter
Users that are interested in LDAPHunter are comparing it to the libraries listed below
Sorting:
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 9 months ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Feb 24, 2026Updated last week
- ☆17Oct 21, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Feb 27, 2026Updated last week
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- ☆23Apr 28, 2024Updated last year
- PowerShell & Python tools developed for CTFs and certification exams☆70Aug 10, 2025Updated 6 months ago
- ☆12Dec 26, 2022Updated 3 years ago
- ☆20Sep 6, 2025Updated 6 months ago
- Ludus range for the Constructing Defense Lab☆106Feb 23, 2026Updated last week
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- ☆35Jul 31, 2024Updated last year
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Apr 1, 2025Updated 11 months ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- CVE-2022-21587 POC☆15Feb 17, 2023Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆11Mar 7, 2021Updated 5 years ago
- Self-mutating macOS implant☆120Dec 18, 2025Updated 2 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Spring-Kafka-Deserialization-Remote-Code-Execution☆32Oct 8, 2023Updated 2 years ago
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 7 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 5, 2025Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 8 months ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 8 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆20Dec 3, 2024Updated last year
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 6 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- ☆74Jun 17, 2025Updated 8 months ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago