Automated Persistence and Lateral Movement using GCP Patch Management
☆16Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for patchy
Users that are interested in patchy are comparing it to the libraries listed below
Sorting:
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- A list of windows potatoes!☆27Mar 6, 2022Updated 4 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- ☆12Jun 22, 2022Updated 3 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Track your beacons in a redteam scoreboard☆15Oct 28, 2020Updated 5 years ago
- Pure Go lang cryptor and shellcode injector☆20Feb 25, 2021Updated 5 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- Generic impersonation and privilege escalation with Golang. Like GenericPotato both named pipes and HTTP are supported.☆115Jun 7, 2021Updated 4 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- A security.txt parser for PHP☆12Oct 8, 2017Updated 8 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Aug 16, 2022Updated 3 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- A simple windows driver that can read and write to process memory from kernel mode☆11Aug 31, 2021Updated 4 years ago
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- ☆15Dec 16, 2020Updated 5 years ago