☆15Jun 27, 2024Updated last year
Alternatives and similar repositories for bad_guest
Users that are interested in bad_guest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆26Mar 11, 2025Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆48Jan 14, 2026Updated 2 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- SAM Dumping in C#☆55Nov 27, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CLI tool to interact with the BloodHound CE API☆70Mar 6, 2026Updated 3 weeks ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- DPAPILAB Next Gen, script collection☆95Aug 26, 2022Updated 3 years ago
- Test AMSI Provider implementation in C#☆43Dec 18, 2024Updated last year
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- ☆22Jun 9, 2025Updated 9 months ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Checklists☆16Sep 22, 2016Updated 9 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆166Apr 17, 2025Updated 11 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 7 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆28Jul 11, 2025Updated 8 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Detect common classes of XPC exploits☆16Mar 19, 2026Updated last week
- ☆28Sep 4, 2024Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 6 months ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago