ToBeatElite / InfoSecNotesLinks
☆12Updated 2 years ago
Alternatives and similar repositories for InfoSecNotes
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
Sorting:
- vulnerable windows binaries for exploitation practice☆49Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Random☆35Updated 3 years ago
- ☆44Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 3 years ago
- ☆39Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Updated 5 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆80Updated 2 years ago
- ☆38Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 10 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Updated 7 months ago
- ☆53Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- ☆49Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- ☆29Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆102Updated last year
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆111Updated 2 years ago
- offensive notes & resources☆43Updated 10 months ago