ToBeatElite / InfoSecNotes
☆11Updated last year
Alternatives and similar repositories for InfoSecNotes:
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
- vulnerable windows binaries for exploitation practice☆40Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆44Updated 4 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- ☆29Updated 7 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Random☆33Updated 2 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆32Updated 2 years ago
- ☆44Updated 9 months ago
- Sliver extension to bypass UAC via cmstp written in rust☆27Updated 10 months ago
- ☆67Updated last month
- Tools I use on red team engagements and more☆32Updated last year
- Your Skyfall Infrastructure Pack☆67Updated 2 weeks ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Windows Post-Exploitation tools wrapper☆12Updated 10 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated 11 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated 3 weeks ago
- ☆38Updated 2 years ago
- Mockingjay process self injection POC☆32Updated last year
- ☆36Updated last year