marcosimioni / omigoodLinks
OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research team, specifically CVE-2021-38647.
☆18Updated 3 years ago
Alternatives and similar repositories for omigood
Users that are interested in omigood are comparing it to the libraries listed below
Sorting:
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- ☆18Updated last year
- ☆12Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆14Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- ☆11Updated last month
- Kibana app for RedELK☆17Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 3 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Configurable, Community driven, HTTP C2 Profile☆18Updated last week
- ☆15Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Some Pentesting Scripts☆11Updated 3 years ago
- ☆11Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- ☆12Updated 4 years ago
- ☆17Updated 4 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Beacon Object Files used for Cobalt Strike☆19Updated last year