Python implementation of select MicroBurst scripts.
☆14Aug 19, 2021Updated 4 years ago
Alternatives and similar repositories for PycroBurst
Users that are interested in PycroBurst are comparing it to the libraries listed below
Sorting:
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- Simple netexec wraper with html repport☆19May 19, 2024Updated last year
- ☆25Oct 1, 2025Updated 5 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Mr.Robot - DIY Self Balancing Robot Project☆10Oct 25, 2017Updated 8 years ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆44Apr 27, 2023Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- ☆76Updated this week
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- Affine Term-Structure Models: Theory and Implementation☆14Apr 6, 2020Updated 5 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Rust crate to run commands as another user☆54Feb 12, 2026Updated 3 weeks ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Feb 26, 2026Updated last week
- Yet another property management system☆10Oct 17, 2025Updated 4 months ago
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Custom deduplicate for Mautic☆10Mar 29, 2021Updated 4 years ago
- Ansible Collection☆12Apr 22, 2025Updated 10 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Oct 10, 2021Updated 4 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago