Security Product Taskbar Icons (to identify from screenshots)
☆58Mar 27, 2020Updated 5 years ago
Alternatives and similar repositories for sectaskbars
Users that are interested in sectaskbars are comparing it to the libraries listed below
Sorting:
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- ☆45Nov 5, 2018Updated 7 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- ☆272Jul 26, 2022Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆123Aug 25, 2018Updated 7 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- ☆11Oct 18, 2019Updated 6 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆11May 2, 2022Updated 3 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆66May 2, 2025Updated 10 months ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆385Mar 5, 2020Updated 6 years ago
- Red Team Tactics, Techniques, and Procedures☆421Feb 4, 2026Updated last month