Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018
☆45May 29, 2019Updated 6 years ago
Alternatives and similar repositories for Abuse-bash-for-windows
Users that are interested in Abuse-bash-for-windows are comparing it to the libraries listed below
Sorting:
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Burp Commander written in Go☆56Feb 11, 2019Updated 7 years ago
- ☆19Jan 31, 2025Updated last year
- ☆128May 22, 2023Updated 2 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Jul 10, 2020Updated 5 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- ☆27May 6, 2024Updated last year
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Freedom Fighting Mode: open source hacking harness☆346Mar 21, 2024Updated last year
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Extract subdomains from rapiddns.io☆22Nov 24, 2022Updated 3 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- ☆49Jan 13, 2020Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- Python automation of Docker.sock abuse☆211Dec 8, 2022Updated 3 years ago