☆76Feb 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for Misc
Users that are interested in Misc are comparing it to the libraries listed below
Sorting:
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- Location of some Active Directory lab scripts I have created and find useful☆110Feb 2, 2026Updated 3 weeks ago
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 2 months ago
- Advanced Hunting Queries☆20Dec 11, 2025Updated 2 months ago
- ☆13Aug 18, 2016Updated 9 years ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 7 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 4 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 2 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Sep 8, 2025Updated 5 months ago
- ☆28Feb 11, 2026Updated 2 weeks ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- ☆21Jan 30, 2024Updated 2 years ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆34May 30, 2025Updated 9 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆37Jul 23, 2025Updated 7 months ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆21Jul 9, 2018Updated 7 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 6 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆162Aug 30, 2025Updated 6 months ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆239Oct 30, 2025Updated 4 months ago
- some KQL Queries for Advanced Hunting☆61Feb 11, 2026Updated 2 weeks ago
- Blog/Journal on how to backdoor VSCode extensions☆76Updated this week
- Exploitation of CVE-2026-24061☆193Jan 22, 2026Updated last month
- ☆49Feb 6, 2026Updated 3 weeks ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆74Nov 10, 2025Updated 3 months ago
- ☆54Oct 13, 2025Updated 4 months ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆47Feb 14, 2026Updated 2 weeks ago