Rogue Synergy server
☆18Mar 8, 2017Updated 9 years ago
Alternatives and similar repositories for Dissonance
Users that are interested in Dissonance are comparing it to the libraries listed below
Sorting:
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆19May 31, 2017Updated 8 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆130Jul 10, 2017Updated 8 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Sustainable shellcode evasion☆113Updated this week
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 2 months ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Plugin for BinaryNinja that provides bookmarking functionality☆21Feb 11, 2021Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- ☆24Feb 19, 2017Updated 9 years ago
- Examine HTTP response headers for common security issues☆38Jun 7, 2022Updated 3 years ago
- ☆16Jul 19, 2017Updated 8 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago
- ☆19Dec 31, 2025Updated 2 months ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Dig through Git commits and logs☆21Jan 8, 2019Updated 7 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago