☆37Dec 10, 2017Updated 8 years ago
Alternatives and similar repositories for incognito2
Users that are interested in incognito2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ThinkPHP vulnerability scan for BurpSuite☆15Nov 18, 2019Updated 6 years ago
- PHP Unserialize Check - Burp Scanner Extension☆18Mar 15, 2018Updated 8 years ago
- POC for NetworkService PrivEsc☆130May 4, 2020Updated 5 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 5 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A webshell helps script kiddies to bypass disable_functions☆18May 26, 2018Updated 7 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆18Nov 28, 2013Updated 12 years ago
- backdoor c2☆40Jan 14, 2020Updated 6 years ago
- .NET Project for performing Authenticated Remote Execution☆406Feb 8, 2023Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- DLLhijack winmm.dll☆116May 20, 2024Updated last year
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆26Sep 7, 2025Updated 6 months ago
- Shellcode injection POC using syscalls.☆117Jun 5, 2020Updated 5 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- ☆15Feb 13, 2018Updated 8 years ago