InfoSec Notes
☆62Mar 23, 2024Updated 2 years ago
Alternatives and similar repositories for InfoSec-Notes
Users that are interested in InfoSec-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆109May 19, 2022Updated 3 years ago
- Remotely dump NT hashes through Windows Crash dumps☆33Oct 29, 2024Updated last year
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆21Oct 30, 2020Updated 5 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- ☆19Jun 25, 2019Updated 6 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- common methods that used by my burp extension projects☆52Apr 12, 2024Updated last year
- Based on minhook☆34Sep 20, 2023Updated 2 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- A PowerShell Module for OneTimeSecret.com☆10Jun 19, 2021Updated 4 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Mar 12, 2026Updated last week
- ☆170Aug 22, 2023Updated 2 years ago
- ☆13Apr 23, 2018Updated 7 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆94Jun 20, 2022Updated 3 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆161Feb 11, 2025Updated last year
- Proxy system calls over an RPC channel☆100Feb 11, 2022Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Dumping DPAPI credz remotely☆1,348Mar 24, 2025Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆49Apr 22, 2017Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- ☆24Mar 12, 2025Updated last year
- subhook wrapper for Nim https://github.com/Zeex/subhook☆19Dec 23, 2024Updated last year
- ☆12Jan 31, 2020Updated 6 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆417May 29, 2024Updated last year
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Nov 28, 2022Updated 3 years ago
- ☆57Jan 15, 2024Updated 2 years ago
- ☆10Aug 17, 2021Updated 4 years ago