Automation for internal Windows Penetrationtest / AD-Security
☆19Jun 2, 2023Updated 2 years ago
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below
Sorting:
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- automatic privilege escalation by pspy☆23Jan 19, 2022Updated 4 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆60Updated this week
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 3 months ago
- ☆11Feb 14, 2023Updated 3 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- A robust Red Team proxy written in Go.☆165Dec 26, 2021Updated 4 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆74Mar 1, 2024Updated 2 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- ☆33Feb 27, 2018Updated 8 years ago
- A simple command line interface for webshells☆28Feb 2, 2023Updated 3 years ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 2 months ago
- ☆33Aug 14, 2020Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆113Jan 25, 2026Updated last month
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- ☆21Jan 8, 2024Updated 2 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Dec 8, 2025Updated 2 months ago