Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!
☆26Jul 28, 2023Updated 2 years ago
Alternatives and similar repositories for the_hax
Users that are interested in the_hax are comparing it to the libraries listed below
Sorting:
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Jun 10, 2020Updated 5 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- NotSoCereal: A Deserialization exploit playground☆54Jan 13, 2022Updated 4 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆15Aug 4, 2017Updated 8 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- GNURadio based scanner for SmartNet II Digital radio systems.☆26Nov 10, 2013Updated 12 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- discover IP ranges. check email security. survey domains.☆40Mar 9, 2023Updated 2 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Aug 10, 2021Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago