ironhulk-0xff / AD_ReconView external linksLinks
☆13Mar 28, 2024Updated last year
Alternatives and similar repositories for AD_Recon
Users that are interested in AD_Recon are comparing it to the libraries listed below
Sorting:
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Jul 7, 2022Updated 3 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Automating Employee Onboarding with Power Automate☆14Jul 20, 2025Updated 6 months ago
- A Programmer☆13Dec 20, 2025Updated last month
- Read Memory without ReadProcessMemory for Current Process☆89Feb 13, 2022Updated 4 years ago
- Useful Cobalt Strike BOFs found or used during engagements☆145Oct 6, 2023Updated 2 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 23, 2025Updated 11 months ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆14Jan 14, 2026Updated last month
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Apr 30, 2024Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Using the power of AI to explain and debug source code☆10Jul 10, 2023Updated 2 years ago
- Returns a HTTP proxy server from a SOCKS5 proxy like Tor☆10Aug 4, 2018Updated 7 years ago
- DEFCON 30 Mainframe buffer overlow workshop container☆92Mar 2, 2024Updated last year
- ☆46Nov 5, 2025Updated 3 months ago
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- ☆12Oct 24, 2021Updated 4 years ago
- Blog aggregator for pegelinux community☆10Dec 9, 2022Updated 3 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 5 months ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 3 months ago
- ☆16Aug 25, 2025Updated 5 months ago
- This is a powershell module to help implement the AD Tier Model☆14Dec 26, 2025Updated last month
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 4 years ago
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- Docker SSH Tunnel☆12Jul 26, 2025Updated 6 months ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Password manager and collaboration tool with multi-factor authentication and client-side encryption☆14Jan 6, 2026Updated last month