kaiwhata / ENGR101-2017View external linksLinks
C code for controlling Raspberry Pi 2s in ENGR101 during 2017
☆30Mar 23, 2017Updated 8 years ago
Alternatives and similar repositories for ENGR101-2017
Users that are interested in ENGR101-2017 are comparing it to the libraries listed below
Sorting:
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 4 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 6 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated last month
- LinkedIn recon the easy way☆111Jul 3, 2025Updated 7 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆137Jul 2, 2025Updated 7 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆104Updated this week
- Active Directory Authentication Library☆90Nov 7, 2025Updated 3 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆172Sep 3, 2025Updated 5 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Aug 30, 2025Updated 5 months ago
- The DCE/RPC / MS-RPC Codegen/Client for Go☆143Feb 8, 2026Updated last week
- The different ways to dump lsass☆264Aug 15, 2025Updated 6 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- UAC Bypass using UIAccess program QuickAssist☆210Nov 30, 2025Updated 2 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Sep 20, 2024Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated 9 months ago
- Automating the MITM attack on WSUS☆306Jan 4, 2026Updated last month
- Enhance Your Active Directory Password Spraying with User Intelligence.☆313Dec 29, 2025Updated last month
- psexecsvc - a python implementation of PSExec's native service implementation☆235Feb 11, 2025Updated last year
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆264May 2, 2025Updated 9 months ago
- Reverse engineering winapi function loadlibrary.☆233Apr 17, 2023Updated 2 years ago
- ☆235Oct 8, 2024Updated last year
- Sleep obfuscation☆267Dec 13, 2024Updated last year
- ☆259Jan 21, 2024Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆359Jan 29, 2026Updated 2 weeks ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆291Mar 31, 2022Updated 3 years ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆332Mar 6, 2025Updated 11 months ago
- 🚀 Publish all your Web pages to IPFS, track released versions and more!☆263May 1, 2025Updated 9 months ago
- A COFF loader made in Rust☆327Aug 20, 2025Updated 5 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆320Feb 1, 2026Updated 2 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆324Jun 27, 2024Updated last year
- Windows protocol library, including SMB and RPC implementations, among others.☆614Jan 21, 2026Updated 3 weeks ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆385Feb 9, 2026Updated last week
- Active Directory delegation management tool☆438Oct 25, 2025Updated 3 months ago
- A BloodHound collector for Microsoft Configuration Manager☆364Jul 7, 2025Updated 7 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆400Jan 14, 2026Updated last month
- Tools for interacting with authentication packages using their individual message protocols☆368Feb 1, 2026Updated 2 weeks ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆394Oct 6, 2024Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆411Mar 21, 2025Updated 10 months ago