Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series
☆107Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for BetaFast
Users that are interested in BetaFast are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Thick Client App developed in C# .NET☆177Aug 17, 2023Updated 2 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 7 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.☆664Jul 31, 2024Updated last year
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Damn Vulnerable Java (EE) Application☆147Jan 23, 2024Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆127Dec 8, 2022Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- ☆65Jan 17, 2026Updated 2 months ago
- ☆11Mar 19, 2019Updated 7 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 5 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- A collection of simple tools and poc-builders☆39Jul 22, 2025Updated 8 months ago
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆14Dec 22, 2024Updated last year
- ☆21Sep 23, 2025Updated 6 months ago
- DLL Hijacking Detection Tool☆545Aug 6, 2019Updated 6 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,689Jan 8, 2024Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆32Aug 16, 2023Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago