a simple powershell wrapper to automate checking a user's access around the network
☆13Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-AccessCheck
Users that are interested in Invoke-AccessCheck are comparing it to the libraries listed below
Sorting:
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- ☆17May 22, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Precompiled executable☆63Feb 21, 2025Updated last year
- ☆34May 14, 2018Updated 7 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆27May 30, 2024Updated last year
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆143Feb 26, 2026Updated 3 weeks ago
- Get started with writing your first ever Windows Driver☆35Nov 4, 2023Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Jul 12, 2023Updated 2 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Useful Cobalt Strike BOFs found or used during engagements☆143Oct 6, 2023Updated 2 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- ☆13Mar 3, 2025Updated last year