☆41Sep 9, 2023Updated 2 years ago
Alternatives and similar repositories for PMP-Decrypter
Users that are interested in PMP-Decrypter are comparing it to the libraries listed below
Sorting:
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- ☆19Nov 28, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆53Sep 23, 2025Updated 5 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆190Nov 21, 2024Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 8 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- ☆120Jan 30, 2024Updated 2 years ago
- ☆33Mar 19, 2025Updated 11 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- Simple Project that Extracts PE Information.☆21Apr 4, 2025Updated 10 months ago
- ☆235Oct 8, 2024Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Oct 27, 2024Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated 3 weeks ago
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆209Sep 30, 2024Updated last year
- ☆26Aug 5, 2025Updated 6 months ago
- command control framework☆32Updated this week
- ☆35Dec 6, 2023Updated 2 years ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- Python tool to automatically perform SPN-less RBCD attacks.☆120Jan 7, 2026Updated last month
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- ☆160Jan 27, 2025Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 9 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago