avcordaro / mesbg-list-builderView external linksLinks
(Unoffiicial) A simple and intuitive tool for building your army lists in Middle-Earth Strategy Battle Game (MESBG).
☆24Jun 26, 2025Updated 7 months ago
Alternatives and similar repositories for mesbg-list-builder
Users that are interested in mesbg-list-builder are comparing it to the libraries listed below
Sorting:
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- Go setter/getter for property ms-Mcs-AdmPwd used by LAPS.☆17Jun 29, 2025Updated 7 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- A modern Nmap automation library for Python☆18Apr 15, 2025Updated 10 months ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- ☆20Apr 21, 2020Updated 5 years ago
- This program serves as a proxy/launcher for another program.☆24Mar 5, 2020Updated 5 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- DES Rainbow Table Online Phase☆25Aug 2, 2017Updated 8 years ago
- Another AMSI bypass - but in C++.☆24May 22, 2023Updated 2 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- C# Service that blocks the computer at unauthorized USB introduction☆25Feb 20, 2020Updated 5 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- ☆39Mar 25, 2021Updated 4 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated 11 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 8 months ago
- ☆33Apr 7, 2020Updated 5 years ago
- A simple, decompressing executable packer☆46May 16, 2022Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆91Aug 21, 2025Updated 5 months ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆91May 24, 2025Updated 8 months ago
- lpe poc for cve-2022-21882☆49Feb 7, 2022Updated 4 years ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Jan 14, 2026Updated last month
- dlopen() filelessly a shared object or even a program (and run it).☆56Aug 31, 2023Updated 2 years ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆55Jun 3, 2020Updated 5 years ago
- ☆76Jan 27, 2025Updated last year
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆142Updated this week
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 7 months ago