Programmatically access a TLS certificate chain in C++ and C#
☆12Oct 27, 2018Updated 7 years ago
Alternatives and similar repositories for CertCheck
Users that are interested in CertCheck are comparing it to the libraries listed below
Sorting:
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- ☆15Nov 2, 2022Updated 3 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Dec 10, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- A pattern for client/server communication via Named Pipes via C#☆97Aug 8, 2018Updated 7 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Edited version of Lee Christensen's Get-NetworkConnection which includes timestamp for each network connection☆36Mar 14, 2018Updated 7 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆38Oct 7, 2021Updated 4 years ago
- MXET-300 Mobile Robotics Class utilizing the SCUTTLE Platform☆13Jun 16, 2025Updated 8 months ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆31Feb 5, 2018Updated 8 years ago
- All the Power with no Shell☆33Dec 13, 2021Updated 4 years ago
- ☆229May 10, 2018Updated 7 years ago
- A scraping and aggregating package using the CollegeFootballData API☆11Dec 11, 2020Updated 5 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago