SQL, IIS, Oh My...
☆22Feb 24, 2025Updated last year
Alternatives and similar repositories for SequelEyes
Users that are interested in SequelEyes are comparing it to the libraries listed below
Sorting:
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 2 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Mar 2, 2026Updated last week
- ☆17Oct 13, 2025Updated 4 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 9 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- ☆96Aug 3, 2025Updated 7 months ago
- ☆23Jun 1, 2022Updated 3 years ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- THOR Thunderstorm Collectors☆25Feb 26, 2026Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 7 months ago
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 9 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆40Feb 19, 2026Updated 2 weeks ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 9 months ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- ☆12Feb 4, 2025Updated last year
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 2 years ago
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Updated this week
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Decrypt GlobalProtect configuration and cookie files.☆157Sep 10, 2024Updated last year
- Audit program for AzureAD☆150May 31, 2023Updated 2 years ago
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 3 months ago
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Protect your Domain Controllers by auditing and restricting LDAP requests☆180May 29, 2025Updated 9 months ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- ☆11Apr 25, 2021Updated 4 years ago
- A course about terraform☆11Apr 13, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago