C code for controlling Raspberry Pi 2s in ENGR101 during 2017
☆30Mar 23, 2017Updated 9 years ago
Alternatives and similar repositories for ENGR101-2017
Users that are interested in ENGR101-2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 7 months ago
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 5 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 3 months ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last week
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆140Jul 2, 2025Updated 8 months ago
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆174Sep 3, 2025Updated 6 months ago
- Active Directory Authentication Library☆90Nov 7, 2025Updated 4 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆110Updated this week
- Comprehensive Windows Syscall Extraction & Analysis Framework☆164Aug 30, 2025Updated 6 months ago
- The different ways to dump lsass☆279Aug 15, 2025Updated 7 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- The DCE/RPC / MS-RPC Codegen/Client for Go☆144Feb 22, 2026Updated last month
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Sep 20, 2024Updated last year
- UAC Bypass using UIAccess program QuickAssist☆219Nov 30, 2025Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 10 months ago
- Automating the MITM attack on WSUS☆315Updated this week
- ☆234Oct 8, 2024Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆241Feb 11, 2025Updated last year
- Enhance Your Active Directory Password Spraying with User Intelligence.☆318Dec 29, 2025Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆289May 2, 2025Updated 10 months ago
- Reverse engineering winapi function loadlibrary.☆238Apr 17, 2023Updated 2 years ago
- Sleep obfuscation☆271Dec 13, 2024Updated last year
- PoC demonstrating a multi process injection chain aimed at remotely executing shellcode☆259Jan 21, 2024Updated 2 years ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆371Jan 29, 2026Updated last month
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- A COFF loader made in Rust☆327Mar 14, 2026Updated last week
- An ADCS honeypot to catch attackers in your internal network.☆326Jun 27, 2024Updated last year
- ☆300Mar 31, 2022Updated 3 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Feb 1, 2026Updated last month
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆400Feb 9, 2026Updated last month
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated 2 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆413Mar 21, 2025Updated last year
- Active Directory delegation management tool☆452Oct 25, 2025Updated 4 months ago
- Windows protocol library, including SMB and RPC implementations, among others.☆688Mar 9, 2026Updated 2 weeks ago
- Tools for interacting with authentication packages using their individual message protocols☆419Mar 1, 2026Updated 3 weeks ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆394Oct 6, 2024Updated last year