ProxyWatch
☆37Feb 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for Proxywatch
Users that are interested in Proxywatch are comparing it to the libraries listed below
Sorting:
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆120Jan 7, 2026Updated last month
- ☆26Mar 6, 2025Updated 11 months ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 4 months ago
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆64Jan 19, 2026Updated last month
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 2 months ago
- collection of blogs about malware development and analysis☆66Dec 2, 2025Updated 2 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Hex-Rays CLI (HCLI)☆50Feb 19, 2026Updated last week
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Oct 1, 2025Updated 4 months ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- ☆35Jan 13, 2026Updated last month
- ☆32Jun 1, 2024Updated last year
- HoppEye is a simple payload picker for BashBunny based on linking payloads to LED color.☆31Mar 7, 2018Updated 7 years ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 8 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆85Feb 9, 2026Updated 2 weeks ago
- ☆38Mar 28, 2025Updated 10 months ago
- BayesML: your first library for Bayesian machine learning☆16Jan 27, 2026Updated last month
- 🔥📜 Forbidden collection of Red Team sorcery 📜🔥☆338Feb 20, 2026Updated last week
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 8 months ago
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- ☆104Nov 14, 2025Updated 3 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆43Oct 11, 2025Updated 4 months ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆66May 2, 2025Updated 9 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆77Jul 25, 2025Updated 7 months ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago