A tool to abuse Exchange services
☆12Mar 18, 2024Updated last year
Alternatives and similar repositories for ruler
Users that are interested in ruler are comparing it to the libraries listed below
Sorting:
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Win32 tool that allows to play with COM objects ( create objects of classes, call methods, set/get properties ). Can also create assembly…☆18May 19, 2022Updated 3 years ago
- DSE & PG bypass via BYOVD attack☆76Jul 12, 2025Updated 7 months ago
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆23Sep 15, 2025Updated 5 months ago
- ☆19Oct 11, 2022Updated 3 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- PoCs of RCEs against open source C2 servers☆91Sep 28, 2024Updated last year
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- ☆23Jun 17, 2024Updated last year
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆54Jan 21, 2025Updated last year
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 10 months ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 8 months ago
- ☆50Jul 9, 2025Updated 7 months ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Tool to get NT system shell .☆24Jul 12, 2021Updated 4 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 3 weeks ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Jun 11, 2021Updated 4 years ago
- Kerberos protocol attacker☆139Feb 1, 2021Updated 5 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆41Jan 14, 2026Updated last month
- ☆40Oct 8, 2024Updated last year
- Proof-of-Concept for CVE-2024-21345☆77Apr 26, 2024Updated last year
- Find DLLs with RWX section☆79Jul 3, 2023Updated 2 years ago