ethicalhackeragnidhra / LaZagne
☆10Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for LaZagne
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- Registry hive parsing the async way☆19Updated 2 months ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Local Privilege Escalation Miner☆24Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Simple C2 over the Trello API☆37Updated last year
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆19Updated 2 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- ☆12Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Data EXfiltration TestER☆21Updated 5 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- ☆10Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Obtain and parse SSL certificates☆9Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago
- ☆22Updated 3 years ago
- Kibana app for RedELK☆16Updated last year
- Reverse shell macro using Word VBA☆13Updated 4 years ago