Tiny and fast port scanner (Sliver edition)
☆30Feb 17, 2026Updated 2 months ago
Alternatives and similar repositories for ascan_sliver
Users that are interested in ascan_sliver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆13Jun 3, 2025Updated 11 months ago
- a minimalistic winrm client written in python☆43Apr 17, 2026Updated 3 weeks ago
- A practical client for ADWS in Golang.☆51Mar 3, 2026Updated 2 months ago
- NTLM HTTP relay tool with SOCKS proxy for browser session hijacking☆155Apr 6, 2026Updated last month
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆129Jan 26, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆39Mar 11, 2026Updated last month
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 3 months ago
- ☆26Dec 31, 2025Updated 4 months ago
- Python based GUI for browsing LDAP☆181Dec 7, 2025Updated 5 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (D…☆120Jan 21, 2026Updated 3 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆216Apr 17, 2026Updated 3 weeks ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆388Updated this week
- A Pentester's Powershell Client☆53Nov 23, 2025Updated 5 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆53Jul 17, 2025Updated 9 months ago
- Bring runZero Exposure Management into BloodHound☆47Apr 16, 2026Updated 3 weeks ago
- Rebuild of portspoof in GO with additional features.☆30Apr 7, 2026Updated last month
- ☆16Jun 15, 2025Updated 10 months ago
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- pwndbg configuration to use tmux panes☆14Jan 15, 2025Updated last year
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆130Updated this week
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆77Apr 26, 2026Updated last week
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆36Feb 16, 2026Updated 2 months ago
- Windows remote execution multitool☆794Mar 25, 2026Updated last month
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 3 years ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated last year
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Aliasr is a modern, feature-rich TUI launcher for pentest commands.☆109Apr 23, 2026Updated 2 weeks ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Atomic test units for BOF execution☆55Apr 26, 2026Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Output the SSH private key to the correct Open SSH format for use☆10Nov 3, 2024Updated last year
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆119Apr 22, 2026Updated 2 weeks ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 4 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆95Jul 15, 2025Updated 9 months ago
- ☆139Nov 17, 2025Updated 5 months ago