Tools for Attacking Pleasant Password Server
☆23Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for PleasantTools
Users that are interested in PleasantTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 10 months ago
- Impacket pre-compiled binaries☆19Jul 31, 2023Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- To audit the security of read-only domain controllers☆118Nov 27, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- ☆12Jan 10, 2025Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- ☆17Sep 22, 2024Updated last year
- ☆44Jul 5, 2024Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24May 19, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 4 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- ☆42Mar 12, 2025Updated last year
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- ☆13Jun 26, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Aug 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- ☆15Jun 23, 2024Updated last year
- ☆94May 26, 2023Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Jan 11, 2024Updated 2 years ago
- ☆202Feb 27, 2026Updated last month
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple BOF to read the protection level of a process☆119May 10, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260May 10, 2023Updated 2 years ago
- ☆64Feb 5, 2024Updated 2 years ago
- wsnet☆26Mar 4, 2026Updated last month
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- GeoServer & GeoTools SQL Injection (CVE-2023-25157 & CVE-2023-25158)☆14Jun 11, 2023Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year