A basic AIX enumeration guide for penetration testers/red teamers
☆32Apr 11, 2017Updated 8 years ago
Alternatives and similar repositories for AIX-for-Penetration-Testers
Users that are interested in AIX-for-Penetration-Testers are comparing it to the libraries listed below
Sorting:
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Python Time Based Authentication Attack Tool☆21Apr 20, 2021Updated 4 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last week
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Apr 21, 2025Updated 10 months ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago