The hidden mstsc recorder player
☆27Mar 9, 2020Updated 5 years ago
Alternatives and similar repositories for cacdec
Users that are interested in cacdec are comparing it to the libraries listed below
Sorting:
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- A rewrite of mactime, a bodyfile reader☆39Aug 5, 2024Updated last year
- ☆25Jul 5, 2018Updated 7 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 2 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- MDE/MDI Defender setup for Ludus☆38Updated this week
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Python object inspector☆16Sep 5, 2022Updated 3 years ago
- Asynchronous DNS-over-HTTPS client for Python☆15Dec 18, 2017Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Windows eventlog formatting, live fetching and querying utility in C☆20May 26, 2020Updated 5 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- IDA plugin to explore and browse tags☆55Jul 19, 2019Updated 6 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Feb 2, 2022Updated 4 years ago
- Copy of Subtee's Repository That's Taken Down☆23Nov 2, 2017Updated 8 years ago
- ☆20Jan 31, 2020Updated 6 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago
- ☆54Apr 27, 2019Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- ☆23Nov 13, 2021Updated 4 years ago