A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).
☆84May 30, 2022Updated 3 years ago
Alternatives and similar repositories for UPnProxyChain
Users that are interested in UPnProxyChain are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆57Jun 2, 2024Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- lpe poc for cve-2022-21882☆49Feb 7, 2022Updated 4 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- ☆108Nov 7, 2024Updated last year
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Jan 19, 2023Updated 3 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- SAMR修改域内主机密码☆10Feb 27, 2022Updated 4 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- IoM defualt mal package☆10Feb 22, 2026Updated last week
- Weaponizing for privileged file writes bugs with PrintNotify Service☆136May 17, 2022Updated 3 years ago
- Timeroasting scripts by Tom Tervoort☆386Nov 11, 2025Updated 3 months ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Aug 9, 2022Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆132Oct 1, 2023Updated 2 years ago
- ☆59Oct 24, 2024Updated last year
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆33Feb 8, 2026Updated 3 weeks ago