ariary / gitar
π‘ Ease file sharing during pentest/CTF πΈ
β12Updated 2 years ago
Alternatives and similar repositories for gitar:
Users that are interested in gitar are comparing it to the libraries listed below
- Automated Persistence and Lateral Movement using GCP Patch Managementβ15Updated 2 years ago
- Exactly what it sounds like, which is something radβ21Updated 2 years ago
- β12Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxesβ12Updated 3 years ago
- visually see issues with supported cipher suitesβ15Updated 8 months ago
- A cloud automation system for Red Teams based on Terraform and Ansibleβ24Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkitβ33Updated 3 years ago
- Red Team C2 and Post Exploitation Codeβ36Updated last week
- A basic proxylogon scannerβ27Updated 3 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20β12Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.β20Updated last year
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- FireProx written in Goβ19Updated 10 months ago
- β23Updated 2 years ago
- Simple C2 over the Trello APIβ38Updated 2 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggersβ18Updated last week
- 3gsocks - a reverse connection socks5 based network pivotβ10Updated 3 years ago
- Log converter from CS log to Ghostwriter CSVβ29Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaβ¦β18Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Updated 3 years ago
- β17Updated last year
- Right-To-Left Override POCβ34Updated 2 years ago
- A script used to query the dehashed API and filter for more useful resultsβ15Updated 3 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.β17Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesomeβ¦β23Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.β33Updated 3 years ago
- Automated compromise detection of the world's most popular packagesβ15Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talkβ9Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/memβ20Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keysβ20Updated 3 years ago