☆21Dec 4, 2019Updated 6 years ago
Alternatives and similar repositories for Frida-Hooks
Users that are interested in Frida-Hooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- We will create muilti-remote with rdp-wrap for windows 10☆15Jul 14, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 8 months ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- PowerShellUtilities provides various utility commandlets.☆51Aug 3, 2020Updated 5 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Aggressor scripts for Cobalt Strike☆61Dec 9, 2019Updated 6 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- Automation framework for attack-defense CTFs.☆16Nov 22, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- ☆10Nov 15, 2020Updated 5 years ago
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Check out: http://www.rfxn.com/projects/linux-malware-detect/☆16Mar 9, 2013Updated 13 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 一个简单的获取代理的类,代理来源http://www.xicidaili.com/☆20Dec 13, 2016Updated 9 years ago
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 3 months ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago