ZephrFish / Stompy
Timestomp Tool to flatten MAC times with a specific timestamp
☆45Updated last year
Alternatives and similar repositories for Stompy:
Users that are interested in Stompy are comparing it to the libraries listed below
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆35Updated 4 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 6 months ago
- ☆51Updated last month
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆25Updated last year
- ☆43Updated 6 months ago
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆27Updated last year
- Nemesis agent for Mythic☆26Updated 4 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Source code and examples for PassiveAggression.☆54Updated 7 months ago
- ☆52Updated last year
- Tool to aid in dumping LSASS process remotely☆35Updated 5 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 7 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆30Updated last year
- Leverages B64 chunks to split files and save to clipboard☆25Updated 7 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 3 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆16Updated last week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated 11 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated 11 months ago
- ☆34Updated last year
- CVE-2013-4786 Go exploitation tool☆38Updated last year