☆58Jun 2, 2025Updated 9 months ago
Alternatives and similar repositories for OktaGinx
Users that are interested in OktaGinx are comparing it to the libraries listed below
Sorting:
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆19Aug 5, 2025Updated 6 months ago
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 5 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- ☆47Dec 5, 2025Updated 2 months ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Blog/Journal on how to backdoor VSCode extensions☆76Feb 24, 2026Updated last week
- Hybrid AD utilities for ROADtools☆108May 25, 2025Updated 9 months ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- ☆141Sep 9, 2025Updated 5 months ago
- ☆85May 15, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Tools for attacking Computer Use Agents☆21Jan 16, 2026Updated last month
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 8 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- ☆15Mar 12, 2025Updated 11 months ago
- This is a v2 version of my first IPMI script, but instead of hardcoding if statements this v2 uses a map function to map a temperature ra…☆11May 13, 2021Updated 4 years ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆274May 2, 2025Updated 10 months ago
- ☆138Nov 17, 2025Updated 3 months ago
- A Payload Analysis Framework☆117Oct 9, 2025Updated 4 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Feb 24, 2026Updated last week
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Resources from B-Sides Bloomington OSINT Workshop☆13Sep 14, 2024Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- Modified version of Pypykatz to print encrypted credentials☆56Dec 26, 2022Updated 3 years ago