A command line tool and a library to generate TLS certificates for development purposes.
☆36Jul 5, 2021Updated 4 years ago
Alternatives and similar repositories for concerto
Users that are interested in concerto are comparing it to the libraries listed below
Sorting:
- ☆17Oct 26, 2018Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ASP.NET templates for modern frontend build tools☆17Feb 10, 2026Updated 3 weeks ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- "its like OAB in python because snake"☆16Feb 5, 2018Updated 8 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Manage your GoDaddy DNS with PowerShell☆20Jul 17, 2024Updated last year
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 7 years ago
- NST Vulnerability Scanner☆18Jan 30, 2019Updated 7 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago