☆19Jul 9, 2022Updated 3 years ago
Alternatives and similar repositories for GoogleWorkspaceDirectoryDump
Users that are interested in GoogleWorkspaceDirectoryDump are comparing it to the libraries listed below
Sorting:
- ☆17Mar 6, 2023Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Mar 2, 2022Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- ☆15Apr 29, 2023Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Stores and analyzes log data☆26Feb 24, 2026Updated 3 weeks ago
- Use Remote Functions to tokenize data with DLP in BigQuery using SQL☆23May 29, 2025Updated 9 months ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- 🌩️ Collection of BloodHound queries for Azure☆84Jan 7, 2025Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆348Mar 4, 2025Updated last year
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Mar 7, 2023Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Feb 18, 2023Updated 3 years ago
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆23Aug 3, 2024Updated last year
- ☆21Dec 1, 2021Updated 4 years ago
- A comprehensive scanner for Google Cloud☆355Dec 5, 2025Updated 3 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆32Jan 27, 2026Updated last month
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Apr 5, 2024Updated last year
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆231Jun 17, 2022Updated 3 years ago