Windows Post-Exploitation tools wrapper
☆12Jun 24, 2024Updated last year
Alternatives and similar repositories for crimson_wisp
Users that are interested in crimson_wisp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- AV Evasion Techniques☆82Jul 28, 2022Updated 3 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 3 years ago
- ☆82Feb 11, 2025Updated last year
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- ☆11Jan 23, 2023Updated 3 years ago
- Exploitation of CVE-2025-29969☆64Feb 20, 2026Updated 2 months ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Apr 19, 2023Updated 3 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw, it needs neither. The same 732-b…☆58Apr 29, 2026Updated last week
- ☆26Sep 5, 2025Updated 8 months ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- SAMR修改域内主机密码☆10Feb 27, 2022Updated 4 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 3 months ago
- ☆16Jun 15, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Melee: Tool to Detect Infections in MySQL Instances☆23Aug 6, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆20Mar 4, 2022Updated 4 years ago
- My OSCP notes. Might help you! Happy to get feedback to improve this package.☆26Jun 24, 2025Updated 10 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Using Docker for Machine Learning Workflows☆13May 27, 2021Updated 4 years ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- copy of original for audit. will be remove soon☆14Mar 6, 2020Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- API Hooking Engine on Windows 10☆11May 10, 2024Updated last year
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Styx is an cross-platform GUI interface for HackTheBox made in GoLang☆31Feb 8, 2026Updated 3 months ago