☆18Feb 14, 2019Updated 7 years ago
Alternatives and similar repositories for schtask_now
Users that are interested in schtask_now are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 7 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆19Dec 8, 2018Updated 7 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Full Antivirus Evasion for Mimikatz☆14Mar 10, 2017Updated 9 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆99Dec 8, 2022Updated 3 years ago
- ☆184Feb 21, 2022Updated 4 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- DAFT: Database Audit Framework & Toolkit☆184Aug 11, 2021Updated 4 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 13 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- A C# implementation of the PowerShell Empire Agent☆73Apr 22, 2019Updated 7 years ago
- .NET 4.0 WinRM API Command Execution☆165Sep 11, 2020Updated 5 years ago
- Simple tool to find code caves in Portable Executable (PE) files.☆24Oct 25, 2018Updated 7 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Dec 6, 2017Updated 8 years ago
- Remotely dump NT hashes through Windows Crash dumps☆33Apr 23, 2026Updated 3 weeks ago
- Lists all visible objects in the Windows kernel object namespace, a command-line WinObj☆16May 27, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows Privesc Check☆20May 20, 2014Updated 12 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆53Dec 4, 2020Updated 5 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- docker percona xtradb cluster 5.7 with proxysql on swarm mode☆10May 10, 2018Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Oct 3, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆25Jun 17, 2017Updated 8 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- https://jimshaver.net/2018/02/22/net-over-net-breaking-the-boundaries-of-the-net-framework/☆19Feb 23, 2018Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14May 7, 2026Updated 2 weeks ago
- ☆16Dec 1, 2019Updated 6 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆400Feb 27, 2024Updated 2 years ago