Precompiled binaries for various projects
☆13Nov 6, 2020Updated 5 years ago
Alternatives and similar repositories for PrecompiledBinaries
Users that are interested in PrecompiledBinaries are comparing it to the libraries listed below
Sorting:
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- ☆17Apr 5, 2021Updated 4 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Jun 30, 2022Updated 3 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- ☆14Sep 25, 2022Updated 3 years ago
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- It is a simple python socket-based chat application where communication established between a single server and client.☆19Aug 9, 2020Updated 5 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Nov 23, 2021Updated 4 years ago
- ☆18Dec 23, 2024Updated last year
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 5 months ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- a minimalistic winrm client written in python☆25Mar 6, 2026Updated 2 weeks ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Go Shellcode Loader to be Integrated in Exploration C2☆27Feb 7, 2025Updated last year
- Install ClickOnce without prompting the user or showing anything☆52Dec 19, 2023Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- ☆43Oct 28, 2021Updated 4 years ago
- ☆33Sep 21, 2024Updated last year
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- GQL Burp Extension☆27Aug 12, 2019Updated 6 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- ☆15Mar 27, 2019Updated 6 years ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- rcat☆74Mar 7, 2022Updated 4 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- copy of original for audit. will be remove soon☆14Mar 6, 2020Updated 6 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- ☆251Mar 29, 2025Updated 11 months ago