Source code and examples for PassiveAggression
☆64Jun 6, 2024Updated last year
Alternatives and similar repositories for PassiveAggression
Users that are interested in PassiveAggression are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆166Dec 7, 2024Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆183Aug 16, 2025Updated 7 months ago
- ☆143May 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆639May 8, 2025Updated 11 months ago
- ☆234Oct 8, 2024Updated last year
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆254Mar 9, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆170May 30, 2024Updated last year
- ☆188Jan 23, 2024Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆155Jun 10, 2024Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆255Jun 6, 2024Updated last year
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆222Aug 12, 2022Updated 3 years ago
- ☆65Mar 15, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Aug 7, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- ☆166Feb 29, 2024Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆281Jun 15, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆593Jun 12, 2024Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated last week
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆208Aug 12, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆462Aug 2, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆188Jun 14, 2025Updated 9 months ago
- ☆94Dec 9, 2025Updated 4 months ago
- ☆35Jan 23, 2025Updated last year