☆37Dec 10, 2017Updated 8 years ago
Alternatives and similar repositories for incognito2
Users that are interested in incognito2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- ThinkPHP vulnerability scan for BurpSuite☆15Nov 18, 2019Updated 6 years ago
- PHP Unserialize Check - Burp Scanner Extension☆18Mar 15, 2018Updated 8 years ago
- POC for NetworkService PrivEsc☆130May 4, 2020Updated 6 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 5 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆19Jul 15, 2021Updated 4 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A webshell helps script kiddies to bypass disable_functions☆18May 26, 2018Updated 7 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆35Jul 14, 2020Updated 5 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated last month
- Steal privileged token to obtain SYSTEM shell☆253Jul 14, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆18Nov 28, 2013Updated 12 years ago
- backdoor c2☆40Jan 14, 2020Updated 6 years ago
- .NET Project for performing Authenticated Remote Execution☆406Feb 8, 2023Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- DLLhijack winmm.dll☆117May 20, 2024Updated 2 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆29Sep 7, 2025Updated 8 months ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Shellcode injection POC using syscalls.☆116Jun 5, 2020Updated 5 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- SQL injection via unsanitized QuerySet.order_by() input☆13Jul 10, 2021Updated 4 years ago
- Loads shellcode from a resource file.☆21Aug 15, 2019Updated 6 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago