☆48Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for DeltaGroup
Users that are interested in DeltaGroup are comparing it to the libraries listed below
Sorting:
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- Scripts to make life easier☆12Jun 16, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Proof-of-concept code for Heartbleed a.k.a. CVE2014-0160 with STARTTLS support for various protocols☆43Jan 7, 2019Updated 7 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆575Jan 22, 2020Updated 6 years ago
- A HTTP PoC Endpoint for cve-2020-5260 which can be deployed to Heroku☆38Apr 16, 2020Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 5 months ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- ☆14Apr 25, 2019Updated 6 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated 11 months ago
- ☆16Jul 5, 2017Updated 8 years ago
- java UI 插件化漏洞扫描工具☆18Apr 14, 2020Updated 5 years ago
- ☆38Jul 3, 2020Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- ☆14Jul 15, 2018Updated 7 years ago
- ☆19Jan 23, 2020Updated 6 years ago
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Aug 20, 2025Updated 6 months ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Citrix ADC Remote Code Execution☆84Jan 11, 2020Updated 6 years ago
- develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are goin…☆18Apr 21, 2018Updated 7 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago