A PowerShell variant of the amazing patch_review.py by kevthehermit
☆193Oct 23, 2025Updated 4 months ago
Alternatives and similar repositories for MSRC-PatchReview
Users that are interested in MSRC-PatchReview are comparing it to the libraries listed below
Sorting:
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆95Dec 28, 2025Updated 2 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆63Jan 5, 2026Updated 2 months ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Oct 20, 2025Updated 4 months ago
- Conditional Access baseline for October 2025☆93Nov 26, 2025Updated 3 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- ☆160May 5, 2025Updated 10 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆65Jan 13, 2026Updated last month
- ☆16Updated this week
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- The command prompt has been disabled by your administrator☆42May 18, 2023Updated 2 years ago
- ☆96Aug 3, 2025Updated 7 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆168Feb 26, 2026Updated last week
- ☆53Sep 23, 2025Updated 5 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated last month
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 8 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 4 months ago
- Generate an email report of Exchange database backup times☆14Oct 21, 2018Updated 7 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆33Dec 10, 2024Updated last year
- Create KeyTab PowerShell Script☆16Nov 3, 2020Updated 5 years ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- Location of some Active Directory lab scripts I have created and find useful☆113Feb 2, 2026Updated last month
- Using Chromium-based browsers as a proxy for C2 traffic.☆146Dec 6, 2025Updated 2 months ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆46Feb 6, 2026Updated 3 weeks ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated last month
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆25Apr 21, 2025Updated 10 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆56Jan 27, 2026Updated last month
- Speaker content from NIC2018☆18Feb 20, 2018Updated 8 years ago
- ☆19Jul 21, 2025Updated 7 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 4 months ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆210Aug 21, 2025Updated 6 months ago