Automation for internal Windows Penetrationtest / AD-Security
☆19Jun 2, 2023Updated 2 years ago
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- ☆22Jan 8, 2024Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- A collection of general purpose C++ utilities that play well with the Standard Library and Boost.☆17Jan 14, 2026Updated 2 months ago
- ☆12Jan 5, 2021Updated 5 years ago
- Modular code generator to generate Swift applications from service models.☆17May 28, 2024Updated last year
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- 🖼 Image Extraction Tool☆18Mar 11, 2021Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 9 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- automatic privilege escalation by pspy☆23Jan 19, 2022Updated 4 years ago
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- ☆11Jan 31, 2018Updated 8 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- PHP SDK to aid in 3p integration with Instant Access☆14Apr 10, 2023Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- A pre-integrated plugin that can be installed into a Wordpress powered website to integrate with Login with Amazon.☆14Jan 14, 2026Updated 2 months ago
- DNSSECChef: DNS/DNSSEC Interception Proxy☆37Mar 29, 2019Updated 6 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago