brandonprry / crestron
Tools for taking over Crestron Windows CE devices
☆31Updated 2 years ago
Alternatives and similar repositories for crestron
Users that are interested in crestron are comparing it to the libraries listed below
Sorting:
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆23Updated 5 years ago
- Slide deck and demo code for my DEFCON 26 talk☆11Updated 6 years ago
- Library of traffic redirectors☆26Updated 5 years ago
- ☆14Updated 5 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Ansible role to configure redirectors for red team C2☆30Updated 6 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- ☆21Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- ManageEngine OpManager Decryption Tools☆34Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 5 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- Injection of managed code into non-managed Windows applications☆28Updated 6 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆36Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Updated 6 years ago
- A python based script to update DNS entries in ADIDNS☆40Updated last year
- Simple reverse ICMP shell☆14Updated last year
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- ☆11Updated 4 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Payload Generation Framework☆9Updated 5 years ago
- ☆11Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆25Updated 10 months ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago