Windows Oracle Database Attack Toolkit
☆80Jul 30, 2022Updated 3 years ago
Alternatives and similar repositories for wodat
Users that are interested in wodat are comparing it to the libraries listed below
Sorting:
- ☆15Jan 26, 2023Updated 3 years ago
- Source Code Management Attack Toolkit☆226Sep 20, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- SpringbootGuiExploit漏洞利用工具测试版☆20Jun 7, 2024Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- XLL Phishing Tradecraft☆439May 24, 2022Updated 3 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- The Token Stealer☆512Jul 13, 2022Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆179Feb 14, 2023Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆459Mar 25, 2024Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Persistence by writing/reading shellcode from Event Log☆379May 27, 2022Updated 3 years ago
- ☆36Apr 24, 2024Updated last year
- 一款内网渗透常用命令的CS插件,解决记不住命令的苦恼!☆19Mar 10, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Msmap is a Memory WebShell Generator.☆584Apr 22, 2023Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆162Jul 17, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- URLFUZZ By T00ls.Net☆24Jul 4, 2023Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- 反取证程序,类似usbkill☆11Apr 22, 2023Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆182Aug 16, 2025Updated 6 months ago
- 用于爬取谷歌关键词搜索的url,便于红队,src等快速提取☆33May 21, 2024Updated last year
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated last year
- 蓝凌OA的前后台密码的加解密工具☆95Dec 21, 2020Updated 5 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- A tiny Reverse Sock5 Proxy written in C :V☆315Nov 28, 2022Updated 3 years ago
- PrintNotifyPotato☆539Dec 2, 2022Updated 3 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆96Feb 19, 2026Updated last week