A basic AIX enumeration guide for penetration testers/red teamers
☆32Apr 11, 2017Updated 9 years ago
Alternatives and similar repositories for AIX-for-Penetration-Testers
Users that are interested in AIX-for-Penetration-Testers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆184Jun 10, 2022Updated 3 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆23Mar 5, 2018Updated 8 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Random source codes☆25Dec 22, 2025Updated 4 months ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆16Oct 15, 2019Updated 6 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆59Aug 9, 2017Updated 8 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆54Oct 25, 2018Updated 7 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated 2 months ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- ☆128Jun 19, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 3 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago