Windows Oracle Database Attack Toolkit
☆80Jul 30, 2022Updated 3 years ago
Alternatives and similar repositories for wodat
Users that are interested in wodat are comparing it to the libraries listed below
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Source Code Management Attack Toolkit☆225Sep 20, 2022Updated 3 years ago
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated last year
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- SpringbootGuiExploit漏洞利用工具测试版☆20Jun 7, 2024Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆458Mar 25, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Msmap is a Memory WebShell Generator.☆584Apr 22, 2023Updated 2 years ago
- Domain penetration automation module one, domain information collection.☆19Mar 31, 2023Updated 2 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Persistence by writing/reading shellcode from Event Log☆379May 27, 2022Updated 3 years ago
- 蓝凌OA的前后台密码的加解密工具☆95Dec 21, 2020Updated 5 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- 通过ptr记录使用ip反查内网域名☆16Sep 10, 2024Updated last year
- The Token Stealer☆511Jul 13, 2022Updated 3 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- URLFUZZ By T00ls.Net☆24Jul 4, 2023Updated 2 years ago
- 域信息收集工具☆413Sep 16, 2022Updated 3 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- 反取证程序,类似usbkill☆11Apr 22, 2023Updated 2 years ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆741May 19, 2023Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆162Jul 17, 2023Updated 2 years ago
- ☆36Apr 24, 2024Updated last year
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆131Nov 25, 2021Updated 4 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆97Nov 15, 2022Updated 3 years ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- PrintNotifyPotato☆539Dec 2, 2022Updated 3 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago