malwareinfosec / FiddleZAP
☆17Updated 3 years ago
Alternatives and similar repositories for FiddleZAP:
Users that are interested in FiddleZAP are comparing it to the libraries listed below
- Sp00fer blog post -☆26Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- visually see issues with supported cipher suites☆16Updated 8 months ago
- WMI SA stuffs☆29Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- A collection of my presentation materials.☆16Updated 10 months ago
- Custom pentesting tools☆25Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Work in Progress repo☆14Updated 5 years ago
- ☆16Updated 7 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- ☆11Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- parsers to make life easier☆12Updated 4 years ago
- ☆12Updated 4 years ago
- ☆12Updated 2 years ago