☆47Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-Everything
Users that are interested in Invoke-Everything are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- ☆19Jan 14, 2026Updated 4 months ago
- ☆43Oct 28, 2021Updated 4 years ago
- Used to get NTLMv2 Hashes from SMB☆24Oct 24, 2024Updated last year
- Burp Suite Certified Practitioner Exam Study☆19Feb 8, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools that can be useful for OSEP exam and PEN300 studies.☆89Mar 14, 2026Updated 2 months ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 9 months ago
- ☆38Aug 6, 2025Updated 9 months ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆32Aug 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆275Jan 18, 2023Updated 3 years ago
- ☆14Dec 24, 2023Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated 2 years ago
- Reports on Driver, LSASS and other security services mitigations☆35Aug 18, 2025Updated 9 months ago
- Azure AD cheatsheet for the CARTP course☆155May 5, 2022Updated 4 years ago
- Pentest scriptkit for your copypasta☆14Feb 18, 2026Updated 3 months ago
- Crack Everything for CrackMapExec version 6☆21Jul 1, 2024Updated last year
- Just a Repo of pure ASCII art ;'..;'☆18May 27, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My Personal Notes of OSEP☆42Jun 1, 2023Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆30Jun 6, 2023Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Mar 19, 2018Updated 8 years ago
- ☆14Jul 26, 2025Updated 9 months ago
- List of payloads: reverse shell, bind shell, webshell.☆71Mar 20, 2026Updated last month
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated 2 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆51Jan 31, 2026Updated 3 months ago
- Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.☆301Apr 26, 2026Updated 3 weeks ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆38Apr 7, 2023Updated 3 years ago
- ☆188Jun 14, 2025Updated 11 months ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆57Jun 7, 2023Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆34Aug 26, 2022Updated 3 years ago