Unit-259 / lolbins
☆12Updated 3 weeks ago
Alternatives and similar repositories for lolbins:
Users that are interested in lolbins are comparing it to the libraries listed below
- Neuviks Terraform Red Team Workshop☆13Updated 4 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- ☆15Updated last month
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆13Updated 2 weeks ago
- Scripts that automate portions of pentests.☆49Updated last week
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆19Updated 4 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆28Updated 3 weeks ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- ☆14Updated 3 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- A user enumeration tool for Slack.☆28Updated 10 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- ☆15Updated last year
- ☆34Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆16Updated last week
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 6 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆25Updated 2 weeks ago
- ☆47Updated 3 years ago
- ☆27Updated last year
- ☆27Updated 2 years ago
- ☆44Updated 9 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago