Groovy Post Exploitation
☆20Oct 21, 2024Updated last year
Alternatives and similar repositories for offensive-groovy
Users that are interested in offensive-groovy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- An offensive toolkit for restless guests #DEFCON33☆59Aug 11, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆36Jan 23, 2025Updated last year
- ☆18Jun 10, 2025Updated 10 months ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 5 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.