☆11Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for utils
Users that are interested in utils are comparing it to the libraries listed below
Sorting:
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Python Script for SAML2 Authentication Passwordspray☆41Jul 5, 2023Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Generate similar looking strings with similar looking Unicode characters.☆14Mar 2, 2017Updated 8 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆21Oct 28, 2019Updated 6 years ago
- ☆48May 12, 2021Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- ☆28Aug 19, 2020Updated 5 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 10 months ago
- ☆21Feb 27, 2021Updated 5 years ago
- Implementation of the compression algorithm used in VBA projects within MS Office applications in C#☆22Apr 29, 2019Updated 6 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Tool to perform lateral movement between AAD joined devices☆65Jun 8, 2022Updated 3 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago