ToBeatElite / InfoSecNotesLinks
☆11Updated 2 years ago
Alternatives and similar repositories for InfoSecNotes
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
Sorting:
- vulnerable windows binaries for exploitation practice☆42Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆49Updated last year
- Get SYSTEM via SeDebugPrivilege☆20Updated 3 years ago
- ☆24Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆74Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Random☆34Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆96Updated last year
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- ☆12Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆22Updated 4 years ago
- Utilities for obfuscating shellcode☆90Updated 5 months ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆83Updated 9 months ago
- Serverless Redirector in various cloud vendor for red team☆72Updated 2 years ago
- ☆89Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Tools I use on red team engagements and more☆33Updated last year
- Just some random Red Team Scripts that can be useful☆154Updated last year
- Find .net assemblies locally☆122Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- D/Invoke standalone shellcode runners☆39Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆124Updated 11 months ago