Python implementation of select MicroBurst scripts.
☆14Aug 19, 2021Updated 4 years ago
Alternatives and similar repositories for PycroBurst
Users that are interested in PycroBurst are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Nov 24, 2020Updated 5 years ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆11May 13, 2024Updated last year
- ☆10Mar 3, 2024Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆27Oct 1, 2025Updated 5 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- CTF challenge and Writeup☆13Apr 11, 2019Updated 6 years ago
- How to Patch / Detour / Hook .NET managed code using DLL injection . TYPE 2 : Target method defined in external DLL☆15Sep 23, 2023Updated 2 years ago
- A curated list of awesome Microsoft Azure resources.☆13Apr 16, 2018Updated 7 years ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- libFuzzer driver for SharpFuzz☆13May 2, 2025Updated 10 months ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Intune goodies☆10Dec 20, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- Refactoring for 51pwn online☆13Dec 9, 2022Updated 3 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- ☆64Jan 2, 2024Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆20Nov 13, 2025Updated 4 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 4 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆43Jun 12, 2024Updated last year
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sudo command for Windows. Supports both x86 and x86_64 arch.☆10Jul 14, 2022Updated 3 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- ☆64Mar 14, 2024Updated 2 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆90Jul 15, 2025Updated 8 months ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month