Simon-AKA-Subliminal / Identify-Malicious-Internet-Users-Using-Tor
☆10Updated 7 years ago
Alternatives and similar repositories for Identify-Malicious-Internet-Users-Using-Tor:
Users that are interested in Identify-Malicious-Internet-Users-Using-Tor are comparing it to the libraries listed below
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- ☆16Updated 6 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- ☆25Updated 6 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- ☆17Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆26Updated 6 years ago
- A Tool for cross-platform System Enumeration☆12Updated 7 years ago
- PoC code from blog☆16Updated 4 years ago
- Random code snippets☆9Updated last year
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆11Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆15Updated 9 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Updated 6 years ago
- ☆18Updated 7 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago