overgrowncarrot1 / Invoke-EverythingView external linksLinks
☆45Nov 5, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-Everything
Users that are interested in Invoke-Everything are comparing it to the libraries listed below
Sorting:
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- ☆17Jan 14, 2026Updated last month
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆43Oct 28, 2021Updated 4 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆51Updated this week
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆13Jul 26, 2025Updated 6 months ago
- ☆13Dec 24, 2023Updated 2 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated last year
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆40Jan 31, 2026Updated 2 weeks ago
- ☆11Dec 17, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆32May 19, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆48Jun 7, 2023Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆29Sep 15, 2025Updated 4 months ago
- Pentest scriptkit for your copypasta☆14May 12, 2025Updated 9 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44May 18, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- ☆186Jun 14, 2025Updated 8 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 3 months ago
- Azure AD cheatsheet for the CARTP course☆147May 5, 2022Updated 3 years ago
- Crack Everything for CrackMapExec version 6☆21Jul 1, 2024Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Code files for CSD 310☆15Aug 19, 2023Updated 2 years ago
- Config files for my GitHub profile.☆18Apr 8, 2025Updated 10 months ago
- The super fast tool for brute forcing subdomains☆27Aug 22, 2022Updated 3 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 9 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆110Jan 3, 2022Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time."☆63Jun 15, 2023Updated 2 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Jan 18, 2023Updated 3 years ago