☆45Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-Everything
Users that are interested in Invoke-Everything are comparing it to the libraries listed below
Sorting:
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- ☆19Jan 14, 2026Updated last month
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆43Oct 28, 2021Updated 4 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- ☆11Dec 17, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- ☆13Dec 24, 2023Updated 2 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- ☆32May 19, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- My Personal Notes of OSEP☆40Jun 1, 2023Updated 2 years ago
- Pentest scriptkit for your copypasta☆14Feb 18, 2026Updated 2 weeks ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆51Jun 7, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- ☆186Jun 14, 2025Updated 8 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 4 months ago
- Azure AD cheatsheet for the CARTP course☆149May 5, 2022Updated 3 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆113Mar 1, 2026Updated last week
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 11 months ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- The super fast tool for brute forcing subdomains☆27Aug 22, 2022Updated 3 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆109Jan 3, 2022Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago