entry33 / aes256_passwd_store
Secure open-source password manager.
☆12Updated 3 years ago
Alternatives and similar repositories for aes256_passwd_store:
Users that are interested in aes256_passwd_store are comparing it to the libraries listed below
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Updated 5 years ago
- Build myself for cs project☆12Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- HTTP discovery and change monitoring tool☆12Updated 2 months ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- ShellC0de Generator☆11Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆9Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆24Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆19Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago