LetMeOutOfYour.net Resources
☆21Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for lmo
Users that are interested in lmo are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 4 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Managed code hooking template.☆108Feb 15, 2021Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Jun 11, 2021Updated 4 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- async parser for JET☆25Nov 14, 2025Updated 4 months ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆201Jun 19, 2020Updated 5 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- ☆15Aug 22, 2022Updated 3 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- ☆25Jul 7, 2022Updated 3 years ago