qtc-de / crypted-cookie-monsterLinks
ccm - A small python library that helps identify vulnerabilities inside of encrypted data
☆11Updated 4 years ago
Alternatives and similar repositories for crypted-cookie-monster
Users that are interested in crypted-cookie-monster are comparing it to the libraries listed below
Sorting:
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- ☆108Updated 3 years ago
- ☆57Updated 2 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 10 months ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆48Updated 5 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 8 months ago
- Collection of red machine learning projects☆40Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- SMB Named Pipe shell☆68Updated 8 months ago
- ☆116Updated 4 months ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- 👊 A small utility to play with IBM MQ☆67Updated 2 years ago
- Electron based screenshot scanner☆68Updated 2 years ago
- async parser for JET☆24Updated last year
- Simple python script for AD enumeration☆31Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Red team oriented key finder and correlator☆20Updated 3 weeks ago
- Managed code hooking template.☆108Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- ☆38Updated 6 months ago
- C# User Simulation☆32Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago