Artifact monitoring that ensures fairplay
☆77Jan 29, 2025Updated last year
Alternatives and similar repositories for Fairplay
Users that are interested in Fairplay are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆128Jun 28, 2023Updated 2 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Tools for attacking Computer Use Agents☆27Jan 16, 2026Updated 2 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- ☆160Apr 17, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103May 4, 2019Updated 6 years ago
- ☆47Jan 31, 2024Updated 2 years ago
- ☆135Dec 4, 2023Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- x86 Homebrew'd Kernel☆10Jul 22, 2020Updated 5 years ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆554Nov 23, 2025Updated 4 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆393Apr 3, 2024Updated last year
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Library of BOFs to interact with SQL servers☆227Dec 3, 2025Updated 3 months ago
- Nameless C2 - A C2 with all its components written in Rust☆284Sep 26, 2024Updated last year
- ☆224Oct 22, 2023Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆335Jul 20, 2024Updated last year
- ☆12Oct 15, 2024Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated 2 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆162Mar 1, 2024Updated 2 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago