KoelhoSec / pimpmyP4wnP1View external linksLinks
This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability without breaking it, by using Pimpmykali script.
☆103Aug 16, 2024Updated last year
Alternatives and similar repositories for pimpmyP4wnP1
Users that are interested in pimpmyP4wnP1 are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆34Feb 6, 2026Updated last week
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆23Jan 17, 2026Updated 3 weeks ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Wazuh - Virtual Machines (OVA and AMI)☆15Updated this week
- LCD GUI for P4wnP1 ALOA☆24May 6, 2023Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆76Dec 2, 2024Updated last year
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 4 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆18Jun 12, 2020Updated 5 years ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆67Jan 30, 2026Updated 2 weeks ago
- Active Directory Auditing and Enumeration☆515Dec 3, 2025Updated 2 months ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Automated exploitation of MSSQL servers at scale☆127Feb 4, 2026Updated last week
- ☆104Nov 14, 2025Updated 3 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 9 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- ☆18Sep 1, 2025Updated 5 months ago
- Collection of tool to find and exploit exposed SickChill/Rage instances☆18Jan 21, 2019Updated 7 years ago
- Plugins for my pwnagotchi projects☆15Mar 15, 2025Updated 11 months ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆17Oct 9, 2023Updated 2 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- BloodHound Attack Research Kit☆584Mar 18, 2025Updated 10 months ago
- A Moodle Scanner☆43Nov 16, 2024Updated last year
- Completely Risky Active-Directory Simulation Hub☆102Nov 21, 2023Updated 2 years ago
- A collection of scripts for use with CrowdStrike Falcon RTR☆19Oct 4, 2024Updated last year
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆16May 17, 2025Updated 8 months ago
- A self-hosted Armory implementation.☆21Jan 1, 2026Updated last month