Artifact monitoring that ensures fairplay
☆78Jan 29, 2025Updated last year
Alternatives and similar repositories for Fairplay
Users that are interested in Fairplay are comparing it to the libraries listed below
Sorting:
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆129Jun 28, 2023Updated 2 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆389Apr 3, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 10 months ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104May 4, 2019Updated 6 years ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- ☆47Jan 31, 2024Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- x86 Homebrew'd Kernel☆10Jul 22, 2020Updated 5 years ago
- Tools for attacking Computer Use Agents☆21Jan 16, 2026Updated last month
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- ☆568Mar 28, 2024Updated last year
- ☆159Apr 17, 2024Updated last year
- ☆12Oct 15, 2024Updated last year
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆546Nov 23, 2025Updated 3 months ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆130Jan 14, 2023Updated 3 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year