☆18Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for WinAWL
Users that are interested in WinAWL are comparing it to the libraries listed below
Sorting:
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- PowerShell SecretManagement module for DPAPI-NG☆31Sep 12, 2025Updated 5 months ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- System Tray Tool for WDAC☆38Jun 25, 2025Updated 8 months ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Resources for our Active Directory security workshops☆141Sep 9, 2021Updated 4 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆18Jul 26, 2025Updated 7 months ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆10Dec 13, 2018Updated 7 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- ☆82Dec 29, 2020Updated 5 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Dec 8, 2022Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- A collection of infrastructure related tests for use with Pester & PowerShell.☆46Oct 15, 2019Updated 6 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- A platform of detailed R programming codes for Data Analytics☆16Sep 24, 2014Updated 11 years ago
- A collection of code (mostly Jupyter notebooks) associated with entries on my blog☆12Oct 8, 2017Updated 8 years ago
- Code for drought detection and attribution using tree-ring reconstructions☆11Feb 19, 2019Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- ☆11Jan 28, 2019Updated 7 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A protovis visualization of the linked open data cloud.☆26Jul 25, 2011Updated 14 years ago