Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.
☆44Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for Firework
Users that are interested in Firework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆25Jul 5, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- Powershell script to setup windows port forwarding using native netsh client☆125Aug 6, 2018Updated 7 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 8 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 7 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Burp Suite Attack Selector Plugin☆62Nov 23, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆428May 31, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆342Dec 6, 2018Updated 7 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆371Feb 23, 2024Updated 2 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆14Aug 27, 2025Updated 8 months ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- ☆184Feb 21, 2022Updated 4 years ago
- A C# implementation of the PowerShell Empire Agent☆73Apr 22, 2019Updated 7 years ago