gentilkiwi / mimifare
☆21Updated last year
Alternatives and similar repositories for mimifare:
Users that are interested in mimifare are comparing it to the libraries listed below
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- ☆25Updated 6 years ago
- C# code to run PIC using CreateThread☆17Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- ☆11Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆16Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆10Updated 7 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Obfuscated Invoke-Mimikatz script☆15Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- ☆26Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago