☆59Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for UltimateAppLockerByPassList
Users that are interested in UltimateAppLockerByPassList are comparing it to the libraries listed below
Sorting:
- ☆48May 12, 2021Updated 4 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Nitrokey's plugin for KeePass☆12Feb 4, 2019Updated 7 years ago
- A DIY project to show failed ssh login attempts on a map in real-time☆12Apr 22, 2025Updated 10 months ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Pip install exploit package☆157Jan 7, 2019Updated 7 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- The goal of this repository is to document the most common techniques to bypass AppLocker.☆2,045Sep 11, 2023Updated 2 years ago
- Simple SMB shares ACL scanner☆35Oct 31, 2018Updated 7 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- ☆14Dec 30, 2024Updated last year
- Missing addon manager for firefox☆17Aug 3, 2023Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆66Sep 9, 2021Updated 4 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆826Nov 15, 2025Updated 3 months ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- EFF's Tracker Blocking Laboratory is an experimental project to test heuristic blocking of non-consensual online tracking. It's based on …☆11Aug 2, 2013Updated 12 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- A simple provider to analyse what gets passed into Microsoft's Anti-Malware Scan Interface☆17Jan 10, 2020Updated 6 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,613Dec 10, 2018Updated 7 years ago
- Some useful scripts I have written or collected☆82Jul 24, 2023Updated 2 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Jan 21, 2017Updated 9 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- ADCS abuser☆314Feb 6, 2023Updated 3 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago