Terribad PrivEsc enumeration script for Windows systems
☆15Oct 23, 2020Updated 5 years ago
Alternatives and similar repositories for Clippy
Users that are interested in Clippy are comparing it to the libraries listed below
Sorting:
- ☆36Nov 4, 2017Updated 8 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- ☆15Feb 11, 2018Updated 8 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- ☆510May 27, 2018Updated 7 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- ☆12Aug 27, 2017Updated 8 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- This is a advanced ransomware example made in AutoIt☆34May 22, 2016Updated 9 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- Pentesting Cheatsheets and Guides☆125Jul 20, 2017Updated 8 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Repository for python exploits☆73Jan 26, 2021Updated 5 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- A short and simple python crawler, that uses Webkit and executes Javascript☆16Jan 25, 2013Updated 13 years ago
- HackTheBox High Definition Badge Generator☆28Jul 1, 2019Updated 6 years ago
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- ☆16Jun 15, 2025Updated 9 months ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- CTF presentation☆13Mar 6, 2015Updated 11 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- A powershell script to fully automate PFsense backups using powershell☆18Aug 29, 2018Updated 7 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago