Quick overview of the domain.
☆55Mar 6, 2026Updated this week
Alternatives and similar repositories for KingCastle
Users that are interested in KingCastle are comparing it to the libraries listed below
Sorting:
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆22Apr 28, 2025Updated 10 months ago
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Feb 16, 2026Updated 3 weeks ago
- Open source application to gain insights into the privacy and security of windows devices.☆14Sep 5, 2024Updated last year
- Overview of MS Defender☆108Feb 20, 2026Updated 2 weeks ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆23Jan 3, 2026Updated 2 months ago
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆37Updated this week
- Put All Mirror in ONE☆12Feb 18, 2026Updated 2 weeks ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 7 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated 2 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 2 months ago
- ☆14Nov 8, 2024Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆19May 29, 2024Updated last year
- ☆16Feb 27, 2026Updated last week
- ☆17May 22, 2024Updated last year
- ☆34Feb 27, 2026Updated last week
- ☆13Sep 15, 2024Updated last year
- FortiWeb CVE-2025-25257 exploit☆64Jul 11, 2025Updated 7 months ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A VPN written in Rust☆13Apr 17, 2025Updated 10 months ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- Super efficient 1-click watermark webpage, offline - protect your personal PDF docs☆57Jun 4, 2025Updated 9 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- ☆15May 3, 2024Updated last year
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated last month
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 4 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago