M507 / MinerLinks
Local Privilege Escalation Miner
☆29Updated 3 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below
Sorting:
- Dumping credentials through windbg and pykd☆41Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- ☆17Updated 3 years ago
- ☆12Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 4 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- My Python Cookiecutter project template☆32Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆22Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆72Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Reverse shell macro using Word VBA☆15Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 weeks ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- ☆67Updated 2 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- AppXSVC Service race condition - privilege escalation☆28Updated 6 years ago