Compile SharpHound and others on Linux
☆24Aug 16, 2024Updated last year
Alternatives and similar repositories for CompileCSDocker
Users that are interested in CompileCSDocker are comparing it to the libraries listed below
Sorting:
- Python passive host discovery script☆11Mar 30, 2025Updated 11 months ago
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated last month
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated last month
- D/Invoke standalone shellcode runners☆40Nov 23, 2023Updated 2 years ago
- C++ Reflective Assembly Loader☆31Mar 7, 2025Updated last year
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- Shellcode loader☆101Nov 24, 2024Updated last year
- Bitpixie exploitation PoC☆98Oct 28, 2025Updated 4 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Access All Networks: an offensive multitool against 802.1X☆20Aug 25, 2025Updated 6 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Run several volatility containers using multiprocessing☆23Mar 12, 2026Updated last week
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- A Simple PoC☆22May 24, 2024Updated last year
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Automate Maldoc creation☆24Apr 22, 2025Updated 10 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- ☆19Oct 27, 2018Updated 7 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 6 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆90Jul 15, 2025Updated 8 months ago
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated last month
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- ☆159Dec 13, 2024Updated last year
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆25Dec 3, 2024Updated last year
- Automating the MITM attack on WSUS☆312Updated this week
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆76Feb 25, 2026Updated 3 weeks ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- ☆24Jun 19, 2025Updated 9 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- Template-based generation of shellcode loaders☆80Apr 20, 2024Updated last year
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆66Jun 25, 2025Updated 8 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆113Mar 19, 2025Updated last year
- Buggy script to play with GPOs☆122Dec 27, 2024Updated last year
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago