ToBeatElite / InfoSecNotes
☆11Updated last year
Alternatives and similar repositories for InfoSecNotes:
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
- vulnerable windows binaries for exploitation practice☆39Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆19Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Brief writeup of post exploitation methodologies.☆17Updated last year
- ☆14Updated last month
- Python3 rewrite of AsOutsider features of AADInternals☆40Updated 2 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆87Updated last year
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆13Updated 5 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆14Updated 2 years ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 6 months ago
- ☆47Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆85Updated 9 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- in-process powershell runner for BRC4☆44Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago