☆12Feb 19, 2026Updated last month
Alternatives and similar repositories for wsnet-dotnet
Users that are interested in wsnet-dotnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- ☆20Feb 1, 2026Updated last month
- ☆39Jan 7, 2025Updated last year
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 5 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- ☆136Dec 4, 2023Updated 2 years ago
- Tool to enumerate unregistered reply URLs for single and multitenant apps in Azure☆15Jan 23, 2025Updated last year
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆39Apr 3, 2023Updated 2 years ago
- wsnet☆26Mar 4, 2026Updated 3 weeks ago
- ☆18Nov 24, 2020Updated 5 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated last year
- maldev obviously☆28May 5, 2025Updated 10 months ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆32Jun 1, 2024Updated last year
- ☆16May 20, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- PyKD DLLs for x86 and x64 platforms☆19Sep 13, 2023Updated 2 years ago
- A collection of BadUSB scripts for the PwnPi & PwnPi A.L.O.A.☆14Nov 14, 2024Updated last year
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Jun 26, 2024Updated last year
- Automated exploitation of MSSQL servers at scale☆128Feb 21, 2026Updated last month
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year