Cisco Unfied Call Manager enumeration
☆25Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for CUCMe
Users that are interested in CUCMe are comparing it to the libraries listed below
Sorting:
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- ☆129Mar 1, 2023Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- A robust Red Team proxy written in Go.☆165Dec 26, 2021Updated 4 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆81Mar 30, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 8 years ago
- ☆59Aug 11, 2023Updated 2 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Apr 29, 2023Updated 2 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆95Aug 1, 2022Updated 3 years ago
- ☆71Nov 20, 2020Updated 5 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆139Mar 19, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆36May 27, 2024Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A Python Obfuscator through AST modification☆27Nov 15, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆220Mar 30, 2022Updated 3 years ago