ToBeatElite / InfoSecNotesLinks
☆11Updated last year
Alternatives and similar repositories for InfoSecNotes
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
Sorting:
- vulnerable windows binaries for exploitation practice☆41Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆47Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Random☆34Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Updated 3 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 7 months ago
- ☆36Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆22Updated 4 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A small red team course☆40Updated 2 years ago
- Sliver extension to bypass UAC via cmstp written in rust☆29Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆71Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 2 weeks ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 5 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- ☆38Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- Get SYSTEM via SeDebugPrivilege☆20Updated 3 years ago
- Get Fine Grained Password Policy☆70Updated 3 months ago
- ☆52Updated last year
- rcat☆68Updated 3 years ago
- ☆44Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 months ago
- ☆21Updated 3 years ago
- ☆70Updated 4 months ago