☆21Dec 4, 2019Updated 6 years ago
Alternatives and similar repositories for Frida-Hooks
Users that are interested in Frida-Hooks are comparing it to the libraries listed below
Sorting:
- We will create muilti-remote with rdp-wrap for windows 10☆15Jul 14, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 8 months ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated last month
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- 一个简单的获取代理的类,代理来源http://www.xicidaili.com/☆20Dec 13, 2016Updated 9 years ago
- Aggressor scripts for Cobalt Strike☆61Dec 9, 2019Updated 6 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Check a list of websites if they have a specific cms installed and show their versions.☆26Aug 7, 2020Updated 5 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]☆32Jun 30, 2023Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Embedded graphics library to create beautiful UIs for any MCU, MPU and display type.☆11Sep 30, 2024Updated last year
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Nov 21, 2018Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago