ayeskatalas / Sophos-Removal-ToolLinks
Tool to remove all versions of Sophos AV\Endpoint Defense
☆27Updated 2 years ago
Alternatives and similar repositories for Sophos-Removal-Tool
Users that are interested in Sophos-Removal-Tool are comparing it to the libraries listed below
Sorting:
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Obtain and parse SSL certificates☆87Updated 3 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆98Updated 8 months ago
- ☆35Updated 3 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- Map remote .NET assemblies to memory for further invocation.☆40Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆78Updated 3 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆30Updated 2 years ago
- ☆36Updated last year
- Yet, Another Packer/Loader☆25Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 3 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- RDP Checker☆64Updated last year
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆14Updated 3 years ago
- ☆22Updated 2 years ago
- ☆55Updated 10 months ago
- Asynchronous RDP/VNC client for Python (GUI)☆73Updated 9 months ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- c# reverse shell poc☆27Updated 6 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆41Updated 4 years ago
- ☆17Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 6 months ago
- A technique for Active Directory domain persistence☆39Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 4 years ago
- The Totally Legit Authentication Dialog☆12Updated 2 years ago