ZephrFish / PotUtils
☆16Updated 6 months ago
Alternatives and similar repositories for PotUtils:
Users that are interested in PotUtils are comparing it to the libraries listed below
- ☆17Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 3 months ago
- ☆27Updated last year
- ☆12Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- ☆15Updated 5 months ago
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- ☆15Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 7 months ago
- ☆14Updated 2 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 9 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- wordlists for password cracking☆25Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Dont Gamble with Risk☆14Updated 11 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Golang Shlyuz Implant Implementation☆12Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Top hashpwn rules☆17Updated 2 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Leverages B64 chunks to split files and save to clipboard☆25Updated 8 months ago
- A user enumeration tool for Slack.☆24Updated 8 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 9 months ago