frozenkp / gdoorLinks
A red team emulation tool deveoped by CyCraft Technology
☆25Updated last year
Alternatives and similar repositories for gdoor
Users that are interested in gdoor are comparing it to the libraries listed below
Sorting:
- AMSI detection PoC☆31Updated 5 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆21Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Updated 4 years ago
- ☆23Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆20Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- ☆25Updated 4 years ago
- ☆26Updated 2 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- My nim learning experiments☆11Updated 2 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- ☆16Updated 4 years ago
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- ☆19Updated 4 years ago
- ☆19Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year