☆15Jun 27, 2024Updated last year
Alternatives and similar repositories for bad_guest
Users that are interested in bad_guest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆26Mar 11, 2025Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆50Jan 14, 2026Updated 3 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 9 months ago
- SAM Dumping in C#☆56Nov 27, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CLI tool to interact with the BloodHound CE API☆70Mar 6, 2026Updated last month
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- ☆22Dec 30, 2025Updated 3 months ago
- DPAPILAB Next Gen, script collection☆96Aug 26, 2022Updated 3 years ago
- Test AMSI Provider implementation in C#☆45Dec 18, 2024Updated last year
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- ☆22Jun 9, 2025Updated 10 months ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Checklists☆16Sep 22, 2016Updated 9 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆165Apr 17, 2025Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆29Jul 11, 2025Updated 9 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Mythic Developer Series: Workshop Golang Agent☆24Jun 27, 2023Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Detect common classes of XPC exploits☆16Mar 19, 2026Updated last month
- ☆29Sep 4, 2024Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆13Jul 2, 2024Updated last year
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 6 months ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆29Jul 27, 2024Updated last year
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago