☆45Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-Everything
Users that are interested in Invoke-Everything are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jan 14, 2026Updated 2 months ago
- ☆43Oct 28, 2021Updated 4 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Burp Suite Certified Practitioner Exam Study☆19Feb 8, 2023Updated 3 years ago
- Tools that can be useful for OSEP exam and PEN300 studies.☆80Mar 14, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆38Aug 6, 2025Updated 7 months ago
- ☆11Dec 17, 2023Updated 2 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 7 months ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆31Aug 9, 2024Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆272Jan 18, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The super fast tool for brute forcing subdomains☆27Aug 22, 2022Updated 3 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago
- Azure AD cheatsheet for the CARTP course☆150May 5, 2022Updated 3 years ago
- Crack Everything for CrackMapExec version 6☆22Jul 1, 2024Updated last year
- My Personal Notes of OSEP☆40Jun 1, 2023Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- List of payloads: reverse shell, bind shell, webshell.☆68Mar 20, 2026Updated last week
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated last month
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆160Mar 22, 2026Updated last week
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆38Apr 7, 2023Updated 2 years ago
- ☆187Jun 14, 2025Updated 9 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 4 months ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- ☆18Jan 20, 2026Updated 2 months ago
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆54Jun 7, 2023Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆34Aug 26, 2022Updated 3 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago