ysoserial.net docker image
☆29Sep 23, 2024Updated last year
Alternatives and similar repositories for ysoserial.net-docker
Users that are interested in ysoserial.net-docker are comparing it to the libraries listed below
Sorting:
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- ☆41Feb 20, 2025Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- ☆23Mar 17, 2024Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆44Nov 29, 2024Updated last year
- ☆18Sep 22, 2024Updated last year
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆95Feb 19, 2026Updated 2 weeks ago
- ☆190Nov 21, 2024Updated last year
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 8 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆37Jan 2, 2025Updated last year
- Deserialization payload generator for a variety of .NET formatters☆178Dec 2, 2025Updated 3 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆164Apr 17, 2025Updated 10 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Generate and Manage KeyCredentialLinks☆248Jan 30, 2026Updated last month
- ☆109Feb 17, 2025Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploit…☆92May 6, 2025Updated 10 months ago
- ☆31May 16, 2024Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- Certipy in Docker☆13Mar 28, 2024Updated last year
- ☆13Dec 27, 2014Updated 11 years ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 2 months ago
- ☆24Apr 18, 2025Updated 10 months ago
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Powerview on steroids☆875Feb 28, 2026Updated last week
- A persistent database + CLI for your BBOT scan data 🧡☆42Feb 27, 2026Updated last week
- ☆381Oct 17, 2025Updated 4 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- Active Directory Authentication Library☆91Nov 7, 2025Updated 4 months ago
- CLI tool to interact with the BloodHound CE API☆69Jan 4, 2026Updated 2 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆214Jan 12, 2026Updated last month