V1V1 / AIX-for-Penetration-TestersView external linksLinks
A basic AIX enumeration guide for penetration testers/red teamers
☆32Apr 11, 2017Updated 8 years ago
Alternatives and similar repositories for AIX-for-Penetration-Testers
Users that are interested in AIX-for-Penetration-Testers are comparing it to the libraries listed below
Sorting:
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- C# DCOM Execution☆18Aug 4, 2019Updated 6 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- ACTIVELabs Security Advisories☆23May 19, 2021Updated 4 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- Python Time Based Authentication Attack Tool☆21Apr 20, 2021Updated 4 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Apr 21, 2025Updated 9 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- ☆28Dec 28, 2017Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 3 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆54Oct 25, 2018Updated 7 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆33Mar 28, 2023Updated 2 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago