Useful Windows and AD tools
☆15Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for ADPWN
Users that are interested in ADPWN are comparing it to the libraries listed below
Sorting:
- ☆18Sep 22, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- ☆14Jul 9, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Mar 25, 2021Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- ☆24Oct 18, 2022Updated 3 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- A more full featured C# API for connecting to and managing Active Directory (AD) and Lightweight Directory (AD-LDS) instances, complete w…☆25Sep 8, 2015Updated 10 years ago
- This code was used for the blogpost on secjuice.☆42Apr 17, 2019Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- PoSh BloodHound Dog Whisperer☆192May 23, 2023Updated 2 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago