☆12Apr 21, 2019Updated 6 years ago
Alternatives and similar repositories for ThunderQuery
Users that are interested in ThunderQuery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Multi Vagrant environment with Active Directory☆14Jun 29, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Aug 4, 2024Updated last year
- ☆34Jul 23, 2018Updated 7 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- programmable e-paper tag with RFID☆10Jul 12, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆28Apr 1, 2018Updated 8 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- ☆20May 10, 2023Updated 2 years ago
- ☆36Nov 4, 2017Updated 8 years ago
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- load macho files in memory without touching the Disk☆44Sep 16, 2022Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Windows Privesc Check - PowerShell☆67Apr 22, 2022Updated 3 years ago
- ICSwiki☆26Jun 4, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago