Link sources to sinks in C# applications.
☆150Apr 10, 2023Updated 2 years ago
Alternatives and similar repositories for route-sixty-sink
Users that are interested in route-sixty-sink are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆229Dec 18, 2025Updated 3 months ago
- Finding Java gadget chains with CodeQL☆185Jan 14, 2025Updated last year
- ☆22Nov 3, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- Java After-Deserialization Attack☆79Apr 26, 2021Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆17May 29, 2018Updated 7 years ago
- JMX enumeration and attacking tool.☆497Jun 26, 2025Updated 8 months ago
- GreHack 2021 CodeQL for Java workshop☆73Nov 19, 2021Updated 4 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,063Jan 22, 2026Updated 2 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆449Mar 9, 2026Updated 2 weeks ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆525Jun 10, 2025Updated 9 months ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆650Feb 15, 2025Updated last year
- Exploring RPC interfaces on Windows☆346Jan 30, 2024Updated 2 years ago
- ☆34Sep 19, 2022Updated 3 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆37May 19, 2021Updated 4 years ago
- Simple WebSocket fuzzer☆32Jun 15, 2023Updated 2 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Jan 29, 2021Updated 5 years ago
- ☆479Nov 20, 2022Updated 3 years ago
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- Exchange ProxyRelay POC☆38Oct 20, 2022Updated 3 years ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆372Dec 9, 2022Updated 3 years ago
- ☆254Sep 28, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- ☆147Jan 16, 2023Updated 3 years ago
- ☆30Jan 12, 2023Updated 3 years ago
- 个人使用的一款Web CMS指纹扫描器☆25Aug 4, 2020Updated 5 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- A C# utility for interacting with SCCM☆683Aug 20, 2025Updated 7 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- Celestion 是一个无回显漏洞测试辅助平台,平台使用flask编写,提供DNSLOG,HTTPLOG等功能。 (界面懒得弄,后续有需要再说)。☆30Aug 24, 2023Updated 2 years ago
- ☆409Mar 17, 2026Updated last week