iamkashz / kashz-jewelsView external linksLinks
Gitbook: kashz-Jewels
☆21Jul 1, 2025Updated 7 months ago
Alternatives and similar repositories for kashz-jewels
Users that are interested in kashz-jewels are comparing it to the libraries listed below
Sorting:
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Let's try harder...☆20Jun 6, 2021Updated 4 years ago
- Notes on Preparing for Offsec☆27Jul 24, 2023Updated 2 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆99Updated this week
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- ☆11May 17, 2023Updated 2 years ago
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆55Updated this week
- Super Simple Windows Web Server☆46Mar 16, 2023Updated 2 years ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated 11 months ago
- ☆10May 6, 2017Updated 8 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Python 3 alternative command line interface for AWS Route 53; enables simple record management and dynamic DNS☆11Dec 17, 2025Updated 2 months ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- How to create an OS from scratch☆11Jan 22, 2020Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- ☆16Jun 21, 2024Updated last year
- ☆11Oct 2, 2025Updated 4 months ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last week
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 3 months ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Code Examples for the Web and Cloud Applications Security Course☆11Mar 2, 2025Updated 11 months ago
- Fully Automated Nim Packages Security Audit☆11Feb 8, 2026Updated last week
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- Some Notes because i am too lazy to search☆12May 10, 2021Updated 4 years ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆31Jan 19, 2026Updated 3 weeks ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆17Mar 10, 2025Updated 11 months ago
- Tools for multilanguage & Markdown multilang☆11Apr 21, 2024Updated last year
- Galène package for YunoHost☆12Jan 23, 2026Updated 3 weeks ago
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago