☆41Feb 20, 2025Updated last year
Alternatives and similar repositories for AWSRoundRobin
Users that are interested in AWSRoundRobin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆57Feb 16, 2025Updated last year
- Deploy a phishing infrastructure on the fly.☆78Dec 21, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆127Dec 12, 2025Updated 4 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆147Nov 6, 2025Updated 5 months ago
- ☆55May 31, 2025Updated 10 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated 2 weeks ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- ☆31Aug 13, 2025Updated 8 months ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Stage 0☆168Dec 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ForsHops☆154Mar 25, 2025Updated last year
- ☆52Mar 30, 2026Updated 2 weeks ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆40Nov 4, 2025Updated 5 months ago
- A BloodHound collector for Microsoft Configuration Manager☆396Jul 7, 2025Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- ☆34Mar 19, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆62Apr 13, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆115Jan 21, 2026Updated 2 months ago
- ☆138Jan 16, 2025Updated last year
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆426Sep 29, 2025Updated 6 months ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- ☆200Mar 28, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Tool for viewing NTDS.dit☆198Mar 14, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- ☆155Mar 5, 2026Updated last month
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆115Feb 13, 2022Updated 4 years ago