Windows Post-Exploitation tools wrapper
☆12Jun 24, 2024Updated last year
Alternatives and similar repositories for crimson_wisp
Users that are interested in crimson_wisp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- AV Evasion Techniques☆83Jul 28, 2022Updated 3 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 3 years ago
- ☆82Feb 11, 2025Updated last year
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- .Net Assembly loader for the GMSAPasswordReader☆19Feb 15, 2023Updated 3 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- ☆11Jan 23, 2023Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Apr 19, 2023Updated 2 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆27Sep 5, 2025Updated 6 months ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- SAMR修改域内主机密码☆10Feb 27, 2022Updated 4 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- ☆16Jun 15, 2025Updated 9 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- My OSCP notes. Might help you! Happy to get feedback to improve this package.☆24Jun 24, 2025Updated 9 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- An open-source AI assisted firmware analysis tool☆117Updated this week
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Using Docker for Machine Learning Workflows☆13May 27, 2021Updated 4 years ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- copy of original for audit. will be remove soon☆14Mar 6, 2020Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- API Hooking Engine on Windows 10☆12May 10, 2024Updated last year
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Various notes I have compiled during the OSEP PEN-300 course.☆41Mar 16, 2025Updated last year