redcanaryco / wwhfView external linksLinks
Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.
☆64Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for wwhf
Users that are interested in wwhf are comparing it to the libraries listed below
Sorting:
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 6 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- A pattern for client/server communication via Named Pipes via C#☆97Aug 8, 2018Updated 7 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Sep 18, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- A curated list of awesome BloodhoundAD resources☆238Oct 13, 2022Updated 3 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago