purpl3f0xsecur1ty / useful_random_stuffLinks
Just some things that have some cool uses
☆114Updated last month
Alternatives and similar repositories for useful_random_stuff
Users that are interested in useful_random_stuff are comparing it to the libraries listed below
Sorting:
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- handy powershell scripts☆65Updated last year
- ☆38Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆346Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated 2 years ago
- OSCP Cheatsheets☆99Updated 6 years ago
- CLI monitor for windows process- & file activity☆94Updated 5 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆120Updated 4 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- My Favorite Offensive Security Scripts☆78Updated 7 months ago
- generate payloads that force authentication against an attacker machine☆115Updated 3 years ago
- ☆33Updated 4 years ago
- ☆47Updated 2 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- ☆92Updated 5 years ago
- Some of my personal notes that helped me pass the OSWP☆59Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆47Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆97Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Dumping LAPS from Python☆283Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆67Updated 3 years ago
- A shot code to Bypass UAC in Windows.☆26Updated 3 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 2 years ago
- Squid Pivoting Open Port Scanner☆90Updated last year