☆24Mar 25, 2024Updated last year
Alternatives and similar repositories for EvilWinRM
Users that are interested in EvilWinRM are comparing it to the libraries listed below
Sorting:
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.☆24Jan 15, 2026Updated last month
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- cobalt strike tools☆31Nov 4, 2021Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Apr 22, 2019Updated 6 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- ☆10Oct 9, 2024Updated last year
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Jun 27, 2018Updated 7 years ago
- a secure and highly-portable reverse proxy (redirector) for your Red Team infrastructure.☆34Sep 4, 2019Updated 6 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆96Oct 15, 2025Updated 4 months ago
- SAOL wordlist 2018☆13Dec 8, 2022Updated 3 years ago
- 用于网站(HTTP)自动化判断开放和网页快照拍摄☆12Jan 25, 2021Updated 5 years ago
- Source Code for 'Building Telegram Bots' by Nicolas Modrzyk☆10Mar 18, 2019Updated 6 years ago
- Mobile application and IoT network analysis automation tool.☆11May 9, 2019Updated 6 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆15May 2, 2022Updated 3 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 3 years ago