claroty / PCOM-ToolsLinks
☆14Updated last year
Alternatives and similar repositories for PCOM-Tools
Users that are interested in PCOM-Tools are comparing it to the libraries listed below
Sorting:
- ☆35Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 11 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Analyse MSI files for vulnerabilities☆143Updated last year
- ☆37Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated last year
- ☆59Updated last year
- Repo for all my exploits/PoCs☆51Updated 9 months ago
- ☆56Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- ☆23Updated last year
- vulnlab.com reaper writeup☆27Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- ☆58Updated 7 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Updated last year
- MS Graph Commands and Tools for Blue Teamers☆52Updated last week
- Diana Credential Recovery Framework☆66Updated 3 weeks ago
- ☆43Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- Proof Of Concepts☆55Updated last month
- Baseline a Windows System against LOLBAS☆70Updated last week
- ☆31Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 2 weeks ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- ☆33Updated 2 years ago