lwangenheim / PW_SpyView external linksLinks
☆28Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for PW_Spy
Users that are interested in PW_Spy are comparing it to the libraries listed below
Sorting:
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆19Dec 18, 2024Updated last year
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆57May 13, 2020Updated 5 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to u…☆103Apr 17, 2020Updated 5 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Dec 10, 2022Updated 3 years ago
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- This repository is for the vagrant instances of VulnHub machines☆46Sep 12, 2024Updated last year
- Red Team Scripts for AWS.☆170Jul 28, 2020Updated 5 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 6 months ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- ☆22May 29, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- ☆46May 9, 2017Updated 8 years ago
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Mar 12, 2023Updated 2 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 7 months ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago