☆13Mar 28, 2024Updated last year
Alternatives and similar repositories for AD_Recon
Users that are interested in AD_Recon are comparing it to the libraries listed below
Sorting:
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Automating Employee Onboarding with Power Automate☆14Jul 20, 2025Updated 7 months ago
- A Programmer☆14Dec 20, 2025Updated 2 months ago
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- Useful Cobalt Strike BOFs found or used during engagements☆143Oct 6, 2023Updated 2 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Updated this week
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated 2 weeks ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Returns a HTTP proxy server from a SOCKS5 proxy like Tor☆10Aug 4, 2018Updated 7 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- DEFCON 30 Mainframe buffer overlow workshop container☆92Mar 2, 2024Updated 2 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated 2 weeks ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Run cmd or stand along server as windows service☆12Apr 25, 2022Updated 3 years ago
- ☆11Jun 24, 2024Updated last year
- Detecting fake news articles by analyzing patterns in writing.☆10Mar 30, 2020Updated 5 years ago
- Docker SSH Tunnel☆12Jul 26, 2025Updated 7 months ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆12Oct 24, 2021Updated 4 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- inspect EntraID SCIM flows for troubleshooting☆30Nov 23, 2025Updated 3 months ago
- Blog aggregator for pegelinux community☆10Dec 9, 2022Updated 3 years ago
- All Apple Scama For phishing☆15Dec 22, 2017Updated 8 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Wireguard Trust Network☆11Feb 10, 2021Updated 5 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago