Ignitetechnologies / Persistence-Accessibility-Features
This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows
☆34Updated 4 years ago
Alternatives and similar repositories for Persistence-Accessibility-Features
Users that are interested in Persistence-Accessibility-Features are comparing it to the libraries listed below
Sorting:
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Updated 5 years ago
- Notes only☆18Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆29Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆45Updated 4 years ago
- ☆30Updated 3 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- ☆133Updated 2 years ago
- Mind Maps for penetration testing☆20Updated 4 years ago
- ☆64Updated last year
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- ☆29Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Simple username generator based on a list of name and surname☆12Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 9 months ago
- ☆19Updated 3 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 4 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated last year
- ☆17Updated 10 months ago
- ☆14Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- ☆24Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- ☆15Updated 3 years ago