VirtueSecurity / benigncertain-monitorView external linksLinks
☆20Apr 21, 2020Updated 5 years ago
Alternatives and similar repositories for benigncertain-monitor
Users that are interested in benigncertain-monitor are comparing it to the libraries listed below
Sorting:
- Event Data Collector☆40Jan 12, 2026Updated last month
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 6 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Slide decks and/or materials from conference presentations☆56Nov 15, 2022Updated 3 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆115Jun 7, 2021Updated 4 years ago
- An azure devops tool for moar automation :D☆20Dec 8, 2022Updated 3 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- ☆26Feb 11, 2025Updated last year
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- ADCS abuser☆313Feb 6, 2023Updated 3 years ago
- ☆39May 21, 2022Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- How to mix C and Go with cgo on Windows☆22Jul 30, 2017Updated 8 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago