A tool for standing up headless C2 for droppables.
☆17Apr 24, 2025Updated 10 months ago
Alternatives and similar repositories for girltalk
Users that are interested in girltalk are comparing it to the libraries listed below
Sorting:
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year
- ☆15Mar 18, 2025Updated last year
- ☆15Dec 16, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- A curated list of awesome HL7 and DICOM of resources, tips, and guides.☆10Apr 29, 2022Updated 3 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Test script for CVE-2020-1472 for both RPC/TCP and RPC/SMB☆61May 1, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- PowerShell wrapper for the Mirth REST API☆13Apr 17, 2023Updated 2 years ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- ☆17Jun 9, 2019Updated 6 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆18Jan 3, 2016Updated 10 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 10 months ago
- http://moaistory.blogspot.com/2016/08/ie10analyzer.html☆19Jul 20, 2024Updated last year
- ☆15Nov 7, 2020Updated 5 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆58Mar 13, 2020Updated 6 years ago
- ☆55Aug 17, 2020Updated 5 years ago
- Eliminates the logging limitations of the Mirth enterprise application integration system by replacing the logging mechanism☆18Jan 10, 2024Updated 2 years ago
- Various scripts containing tweaks for optimizing certain areas of Windows 10/11☆10Dec 2, 2023Updated 2 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- The very simple ETS wrapper simplifying cross-process ETS handling (like `Agent`, but `:ets`).☆13Jun 7, 2019Updated 6 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- CTFs On Demand☆13Mar 23, 2025Updated 11 months ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- Kafka consumer & producer for scalaz-stream☆12Dec 15, 2017Updated 8 years ago
- Dotbot managed dotfiles for a polyglot dev using WSL. Includes PowerShell stuff for Windows Installation☆16Aug 4, 2025Updated 7 months ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- PDP-11 operating system.☆29Nov 2, 2021Updated 4 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago