Leverages B64 chunks to split files and save to clipboard
☆26Dec 7, 2025Updated 4 months ago
Alternatives and similar repositories for ChunkyIngress
Users that are interested in ChunkyIngress are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a backup/test setup for the /r/ActiveDirectory reddit wiki and resource posts.☆19Mar 5, 2026Updated 2 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- ☆16Dec 7, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆34Sep 17, 2025Updated 7 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- AutoPoC Generator HoneyPoC☆36Dec 7, 2025Updated 4 months ago
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- A PowerShell module that uses the WIN_API to access the registry☆14Apr 13, 2017Updated 9 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Dec 7, 2025Updated 4 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆116Mar 27, 2024Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ☆39Apr 3, 2023Updated 3 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆132Apr 23, 2026Updated last week
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Windows Access token manipulation tool made in C#☆25Aug 24, 2025Updated 8 months ago
- ☆15Oct 29, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆95Mar 12, 2026Updated last month
- ☆39Oct 12, 2022Updated 3 years ago
- Malware traffic obfuscation library☆38Jul 24, 2025Updated 9 months ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated 2 years ago
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆29Apr 12, 2026Updated 3 weeks ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- ☆43Feb 18, 2025Updated last year
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 25, 2026Updated last week
- A simple tool to interact with web shells and command injection vulnerabilities☆36Nov 26, 2024Updated last year
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year