Automation for internal Windows Penetrationtest / AD-Security
☆19Jun 2, 2023Updated 2 years ago
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spawn Up quickly Elastic EDR Panel☆16Jan 29, 2022Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 5 years ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 5 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Impacket is a collection of Python classes for working with network protocols.☆10Mar 24, 2026Updated last month
- ☆23Mar 23, 2026Updated last month
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- ☆12Jan 5, 2021Updated 5 years ago
- The most portable alternative to Microsoft.Build for evaluating, manipulating, and other progressive data processing in a compatible XML-…☆18Feb 22, 2024Updated 2 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- 🖼 Image Extraction Tool☆18Mar 11, 2021Updated 5 years ago
- automatic privilege escalation by pspy☆23Jan 19, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BOF template with boflink and mutator kit support☆50Jan 8, 2026Updated 3 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Jan 5, 2022Updated 4 years ago
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- PHP SDK to aid in 3p integration with Instant Access☆14Apr 10, 2023Updated 3 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆38Aug 31, 2025Updated 8 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- A pre-integrated plugin that can be installed into a Wordpress powered website to integrate with Login with Amazon.☆14Jan 14, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DNSSECChef: DNS/DNSSEC Interception Proxy☆38Mar 29, 2019Updated 7 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆448Oct 19, 2022Updated 3 years ago
- Windows NTLMSSP library☆10Aug 27, 2021Updated 4 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- ⏱ Superfast ^Advanced wildcards++? | Unique algorithms that was implemented on native unmanaged C++ but easily accessible in .NET via Con…☆28Jul 18, 2021Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago