deadbeefmonster / docker-binaryexploitation
Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)
☆24Updated last year
Alternatives and similar repositories for docker-binaryexploitation:
Users that are interested in docker-binaryexploitation are comparing it to the libraries listed below
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆50Updated 3 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Tools that trigger False Positive AV alerts☆44Updated last month
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆42Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Posts about different topics☆36Updated 11 months ago
- ☆47Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- ☆30Updated 2 years ago
- ☆42Updated 2 years ago
- Slack C2bot that executes commands and returns the output.☆45Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- ☆41Updated 4 years ago