☆16Dec 7, 2025Updated 2 months ago
Alternatives and similar repositories for SCCMSiteCodeHunter
Users that are interested in SCCMSiteCodeHunter are comparing it to the libraries listed below
Sorting:
- ☆17Jan 9, 2025Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆42Jan 6, 2026Updated last month
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Active Directory Firewall☆98Updated this week
- Detect common NFS server misconfigurations☆98Feb 4, 2026Updated 3 weeks ago
- Run Dockerized web browsers from other operating systems on Linux.☆14Mar 2, 2025Updated 11 months ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- ☆31Dec 5, 2024Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- ☆51Jun 28, 2025Updated 8 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated last month
- Python script to leverage MSFT_MTProcess WMI class☆39Sep 17, 2025Updated 5 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- ☆50May 4, 2025Updated 9 months ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 3 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated 11 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 6 months ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆275Dec 27, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago