cmu-sei / GHOSTS-SPECTREView external linksLinks
SPECTRE enables GHOSTS clients to have and build individual preferences over time.
☆20Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for GHOSTS-SPECTRE
Users that are interested in GHOSTS-SPECTRE are comparing it to the libraries listed below
Sorting:
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Yu-Gi-Oh! Card Search Discord Bot☆10Aug 13, 2023Updated 2 years ago
- Quest Soft Player in java☆11Mar 12, 2024Updated last year
- ☆13Mar 11, 2025Updated 11 months ago
- Script to gather Auditpol data forest wide as well as various other Audit Metadata from DC's, Servers and Workstations.☆12Jul 6, 2017Updated 8 years ago
- 直接机器翻译所有使用RPGmakerMV制作的成品rpg游戏中的菜单、人物对话、人物名、物品等。☆12Jul 4, 2020Updated 5 years ago
- A simple trivia desktop app☆19May 14, 2025Updated 9 months ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Quick Launch Toolbar for Shortcuts and Links in Windows 11☆17Dec 25, 2024Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Android auto Wake-on-Lan☆13Jul 28, 2014Updated 11 years ago
- Collection of reusable references☆14Jan 1, 2026Updated last month
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated 11 months ago
- 日版愛麗絲專用的(偽)瀏覽器☆10Sep 17, 2023Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Oct 10, 2022Updated 3 years ago
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆13Dec 9, 2018Updated 7 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆16Oct 21, 2023Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- A self-hosted Armory implementation.☆21Jan 1, 2026Updated last month
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆13Jun 5, 2020Updated 5 years ago
- EcoTubeHQ Video Player offers high quality video playback for many DRM-free streaming services at minimal bitrates based on Celluloid Pla…☆18Jan 14, 2026Updated last month
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆28Sep 30, 2021Updated 4 years ago
- Official documentation for TheHive Project applications☆21Sep 29, 2023Updated 2 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- A curated list of various bug bounty tools☆19Nov 7, 2021Updated 4 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆23Mar 24, 2022Updated 3 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago