☆12Oct 15, 2024Updated last year
Alternatives and similar repositories for dockerBuilds
Users that are interested in dockerBuilds are comparing it to the libraries listed below
Sorting:
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Automation framework for attack-defense CTFs.☆16Nov 22, 2019Updated 6 years ago
- Understanding AMM models in DeFI☆10Jul 28, 2021Updated 4 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- James Lee, Develop a Python App to Access Key Vault Using a Service Principal, 01.25.21☆12Jan 28, 2021Updated 5 years ago
- ☆16Jul 8, 2024Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- ☆12Jun 4, 2025Updated 9 months ago
- Contracts for Robo Vaults☆10Jul 15, 2021Updated 4 years ago
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 6 months ago
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆43Apr 3, 2025Updated 11 months ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- ☆14Jan 25, 2022Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Creative Power of the Flower of Life eBook☆16Jul 29, 2016Updated 9 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated last month
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- Passive Security Tools Fingerprinting Framework☆75Mar 26, 2021Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- ☆15May 6, 2021Updated 4 years ago
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago