Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)
☆36Dec 23, 2019Updated 6 years ago
Alternatives and similar repositories for leHACK19
Users that are interested in leHACK19 are comparing it to the libraries listed below
Sorting:
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Auto Completion for contacts in a mutt aliases file☆13Oct 8, 2019Updated 6 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆14Oct 21, 2019Updated 6 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- MSJsonKit是用于Objective-C的json序列化库,基于NSJSONSerialization和objc/runtime.h,可以实现Objective-C对象(包含自定义对象)与json字符串的相互转化☆13Dec 2, 2015Updated 10 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Jun 14, 2024Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Jul 21, 2020Updated 5 years ago
- Generador de servidores ssh locales y públicos.☆19Oct 4, 2020Updated 5 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Automatically find certain gems in King of Thieves☆10May 15, 2025Updated 9 months ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Tool that assists in migrating firewall rules from Cisco to Checkpoint. Will optimize rules for you (rationalization, reuse merging, etc.…☆22Nov 10, 2020Updated 5 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆27Apr 28, 2020Updated 5 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago