dogancanbakir / pirebok
pîrebok (from Kurdish "witch") - a guided adversarial fuzzer
☆15Updated last year
Alternatives and similar repositories for pirebok:
Users that are interested in pirebok are comparing it to the libraries listed below
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated this week
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Compiled Binaries for Sharp Suite☆13Updated 5 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 8 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- ☆19Updated 4 years ago
- ☆10Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- AMSI detection PoC☆30Updated 4 years ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- μετάμάσκα - malevolent payload classifier☆23Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- leaking net-ntlm with webdav☆24Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- ☆15Updated last year