ProxyWatch
☆46Feb 28, 2026Updated 2 weeks ago
Alternatives and similar repositories for Proxywatch
Users that are interested in Proxywatch are comparing it to the libraries listed below
Sorting:
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- Python tool to automatically perform SPN-less RBCD attacks.☆124Jan 7, 2026Updated 2 months ago
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆38Feb 22, 2026Updated 3 weeks ago
- collection of blogs about malware development and analysis☆70Dec 2, 2025Updated 3 months ago
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- AutoMSF is a Python script designed for fast generation and deployment of multiple types of Meterpreter reverse_https payloads. Created t…☆19Mar 20, 2025Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 8 months ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆352Mar 7, 2026Updated last week
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆28Feb 4, 2026Updated last month
- ☆32Jun 1, 2024Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 3 months ago
- ☆27Mar 6, 2025Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆69Jan 19, 2026Updated 2 months ago
- A better netcat for Hackers☆33Dec 1, 2025Updated 3 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- ☆33Mar 19, 2025Updated last year
- ☆26Aug 11, 2025Updated 7 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆85Aug 13, 2024Updated last year
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- ☆19Oct 25, 2024Updated last year
- ☆38Mar 28, 2025Updated 11 months ago
- A C++ wrapper library around Windows WFP API which greatly simplifies the usage of the tedious WFP API☆23Aug 2, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- BOF to run PE in Cobalt Strike Beacon without console creation☆187Nov 23, 2025Updated 3 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 3 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 9 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆88Feb 9, 2026Updated last month