kartikdurg / Terrible-Thick-Client
"Terrible Thick Client" is a vulnerable application developed in C# .NET framework.
☆20Updated last year
Alternatives and similar repositories for Terrible-Thick-Client:
Users that are interested in Terrible-Thick-Client are comparing it to the libraries listed below
- Tools used for Pentesting☆22Updated 2 years ago
- Scripts that automate portions of pentests.☆50Updated last week
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- ☆27Updated 2 years ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆14Updated 2 weeks ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Vulnerable Windows Application☆15Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- A Moodle Scanner☆40Updated 5 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- A small red team course☆37Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆13Updated last month
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆11Updated 2 years ago
- ☆15Updated last year
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆21Updated 3 years ago
- ☆24Updated 6 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- LDAP Enumeration Tool for Pentesters☆44Updated 2 weeks ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- ☆20Updated 3 years ago
- Cobalt Strike BOFS☆16Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- ☆32Updated 2 years ago
- ☆22Updated 11 months ago
- Azure Service Subdomain Enumeration☆60Updated 8 months ago