Terribad PrivEsc enumeration script for Windows systems
☆15Oct 23, 2020Updated 5 years ago
Alternatives and similar repositories for Clippy
Users that are interested in Clippy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆37Nov 4, 2017Updated 8 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆19Mar 16, 2021Updated 5 years ago
- ☆510May 27, 2018Updated 7 years ago
- rsmware forked C#/PHP/MySQL☆14Apr 27, 2017Updated 9 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 6 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- This is a advanced ransomware example made in AutoIt☆34May 22, 2016Updated 10 years ago
- ☆13Oct 12, 2019Updated 6 years ago
- Generate RSA keys, encrypt and decrypt data☆23Apr 8, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- Pentesting Cheatsheets and Guides☆127Jul 20, 2017Updated 8 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last month
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- HackTheBox High Definition Badge Generator☆28Jul 1, 2019Updated 6 years ago
- .NET project for writing files to local or remote hosts☆43Jan 27, 2020Updated 6 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- ☆63Oct 29, 2012Updated 13 years ago
- A curated list of MCP servers for AI finance agents☆44Feb 16, 2026Updated 3 months ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 6 years ago
- MITRE ATT&CK visualizations☆11Jan 28, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Jul 5, 2019Updated 6 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- A tool to brute force forms based authentication mechanism☆11Nov 2, 2019Updated 6 years ago
- Experimental examples of Ransomware in different languages☆37Nov 21, 2017Updated 8 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago