egypt / fake-webdavLinks
☆11Updated 4 years ago
Alternatives and similar repositories for fake-webdav
Users that are interested in fake-webdav are comparing it to the libraries listed below
Sorting:
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 6 months ago
- ☆14Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- ☆12Updated 4 years ago
- ☆24Updated 4 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- ☆18Updated last year
- Kibana app for RedELK☆17Updated 2 years ago
- ☆15Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- ☆18Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆11Updated 2 years ago
- ☆9Updated 4 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- Walking the PEB in VBA☆23Updated 5 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆22Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago