☆12Feb 19, 2026Updated last month
Alternatives and similar repositories for wsnet-dotnet
Users that are interested in wsnet-dotnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cisco CallManager User Enumeration☆16Aug 16, 2022Updated 3 years ago
- ☆21Feb 1, 2026Updated 2 months ago
- ☆39Jan 7, 2025Updated last year
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 5 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- ☆136Dec 4, 2023Updated 2 years ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆39Apr 3, 2023Updated 3 years ago
- wsnet☆26Mar 4, 2026Updated last month
- ☆18Nov 24, 2020Updated 5 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated last year
- maldev obviously☆28May 5, 2025Updated 11 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16May 20, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆16Feb 27, 2024Updated 2 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- PyKD DLLs for x86 and x64 platforms☆19Sep 13, 2023Updated 2 years ago
- RPC to WebClient startup☆56Aug 19, 2025Updated 7 months ago
- A collection of BadUSB scripts for the PwnPi & PwnPi A.L.O.A.☆14Nov 14, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Jun 26, 2024Updated last year
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆75Apr 11, 2026Updated last week
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago