☆17Mar 6, 2023Updated 3 years ago
Alternatives and similar repositories for GCPTokenReuse
Users that are interested in GCPTokenReuse are comparing it to the libraries listed below
Sorting:
- ☆19Jul 9, 2022Updated 3 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- Manage Engine Decrypter☆24Oct 17, 2022Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- ☆13Dec 27, 2014Updated 11 years ago
- ☆10Dec 4, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Shellcode Loader with Indirect Dynamic syscall Implementation , shellcode in MAC format, API resolving from PEB, Syscall calll and syscal…☆322Aug 2, 2023Updated 2 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Infect Shared Files In Memory for Lateral Movement☆193Dec 14, 2022Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Mar 2, 2022Updated 4 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆31Dec 5, 2024Updated last year
- Stores and analyzes log data☆26Feb 24, 2026Updated 3 weeks ago
- Use Remote Functions to tokenize data with DLP in BigQuery using SQL☆23May 29, 2025Updated 9 months ago
- A fake AMSI Provider which can be used for persistence.☆156May 16, 2021Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆251Jul 9, 2024Updated last year
- Deploys Zeek on Google Cloud☆27Feb 24, 2026Updated 3 weeks ago
- My python3 implementation of a Forward Shell☆37Jan 25, 2019Updated 7 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆155Jan 21, 2023Updated 3 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago