Wireshark RDP resources
☆221Jun 2, 2025Updated 11 months ago
Alternatives and similar repositories for wireshark-rdp
Users that are interested in wireshark-rdp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- An x64dbg plugin which marks XFG call signatures as data☆81May 12, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆85Mar 29, 2023Updated 3 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆190Nov 19, 2025Updated 5 months ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- A simple pentest container equipped with common python pentest tools.☆44Jan 30, 2026Updated 3 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆263May 9, 2024Updated last year
- Tools and PoCs for Windows syscall investigation.☆366Dec 2, 2025Updated 5 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆126May 9, 2023Updated 2 years ago
- Linux Security and Hardening Security Guide☆215Sep 17, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆382Apr 26, 2026Updated last week
- More examples using the Impacket library designed for learning purposes.☆266Nov 4, 2022Updated 3 years ago
- Windows And Ways To Break It☆100Jan 28, 2026Updated 3 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,517Mar 18, 2026Updated last month
- Azure - IaaS Storage Monitoring☆11Feb 21, 2023Updated 3 years ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- A tool that shows detailed information about named pipes in Windows☆743Nov 15, 2024Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Policy Module for Microsoft Active Directory Certificate Services☆283Feb 15, 2026Updated 2 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆305Oct 29, 2024Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆334Feb 16, 2026Updated 2 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 7 months ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆48Apr 9, 2023Updated 3 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆912Mar 25, 2026Updated last month
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆114Apr 28, 2026Updated last week