☆25Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for Tools
Users that are interested in Tools are comparing it to the libraries listed below
Sorting:
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 3 months ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Python implementation of select MicroBurst scripts.☆14Aug 19, 2021Updated 4 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆206Aug 12, 2024Updated last year
- A tool collection of various attacks on TLS based on TLS-Attacker☆21Jun 25, 2025Updated 8 months ago
- ☆44Oct 11, 2025Updated 4 months ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Active Directory Auditing and Enumeration☆517Dec 3, 2025Updated 2 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 9 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Custom queries list for BloodHound☆31Jul 8, 2025Updated 7 months ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- A simple library to interface with Gwiot 7941E RFID reader☆11Nov 2, 2020Updated 5 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- A community-driven collection of BloodHound queries☆171Feb 17, 2026Updated last week
- ☆104Nov 14, 2025Updated 3 months ago
- The Python book for developers who miss curly braces. Learn real Python while complaining about whitespace. 15 chapters of education, com…☆15Aug 21, 2025Updated 6 months ago
- Returns a HTTP proxy server from a SOCKS5 proxy like Tor☆10Aug 4, 2018Updated 7 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- The PoLRBear Project☆35Mar 12, 2021Updated 4 years ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆44Feb 18, 2025Updated last year
- C# implementation of harmj0y's PowerView☆46Mar 22, 2020Updated 5 years ago
- Send text messages online to any mobile phone in the world.☆11Feb 24, 2017Updated 9 years ago
- ☆11Jun 24, 2024Updated last year
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 3 months ago
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago