☆37Dec 10, 2017Updated 8 years ago
Alternatives and similar repositories for incognito2
Users that are interested in incognito2 are comparing it to the libraries listed below
Sorting:
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- ThinkPHP vulnerability scan for BurpSuite☆15Nov 18, 2019Updated 6 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- POC for NetworkService PrivEsc☆130May 4, 2020Updated 5 years ago
- ☆537Updated this week
- PHP Unserialize Check - Burp Scanner Extension☆18Mar 15, 2018Updated 7 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- .NET Project for performing Authenticated Remote Execution☆405Feb 8, 2023Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- ☆17Oct 4, 2020Updated 5 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Sep 25, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Jul 30, 2020Updated 5 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated 11 months ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- ☆15Feb 13, 2018Updated 8 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- SLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#☆66Aug 29, 2023Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Solana Dex Info for arbitrage bot☆18Sep 6, 2025Updated 5 months ago