Utilities for decrypting and hashing SolarWinds Orion credentials
☆14Oct 25, 2018Updated 7 years ago
Alternatives and similar repositories for solarwinds-orion-cryptography
Users that are interested in solarwinds-orion-cryptography are comparing it to the libraries listed below
Sorting:
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- ☆16May 15, 2021Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Oct 9, 2023Updated 2 years ago
- Study and research with your docs, media, and AI in one place☆34Updated this week
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆31Aug 8, 2022Updated 3 years ago
- "Mingw64 Driver Plus Plus": Mingw64, C++, DDK and (EA)STL made easy!☆44Feb 25, 2026Updated last week
- ☆13Nov 5, 2024Updated last year
- ☆81Nov 2, 2019Updated 6 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- The Larafilm Frontend☆10Dec 10, 2022Updated 3 years ago
- Higgsfield AI scam exposed: fraud, fake unlimited plans, mass bans, predatory billing, non-consensual deepfakes, Reddit spam, unpaid crea…☆48Feb 13, 2026Updated 3 weeks ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- ☆19Jan 15, 2026Updated last month
- ☆11Jun 20, 2023Updated 2 years ago
- A jquery plugin which add loading indicators into buttons☆12Oct 23, 2020Updated 5 years ago
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- Example of how to setup Kafka Docker multi cluster environment with MirrorMaker2☆10Jun 21, 2023Updated 2 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- BookWorm: A Dataset for Character Description and Analysis [EMNLP Findings 2024]☆14Feb 28, 2025Updated last year
- 在庫管理WEBアプリ(Django Practice)☆16Feb 10, 2023Updated 3 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆14Jan 10, 2025Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- The repository for papaer "Distance between Relevant Information Pieces Causes Bias in Long-Context LLMs"☆14Dec 16, 2024Updated last year
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago