504 VSAgent
☆25Feb 21, 2018Updated 8 years ago
Alternatives and similar repositories for 504vsa
Users that are interested in 504vsa are comparing it to the libraries listed below
Sorting:
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Sep 4, 2018Updated 7 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Oct 25, 2018Updated 7 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆58Mar 13, 2020Updated 5 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆31Jan 28, 2026Updated last month
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- This repo is for the Ruby version of EyeWitness☆28Nov 18, 2014Updated 11 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- DEFCON 27 slides and workshop materials.☆127Jun 29, 2020Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Rekall is an endpoint security solution.☆38Feb 12, 2018Updated 8 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Jan 8, 2020Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Aug 1, 2021Updated 4 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- Skillets is the default holding place for useful Panhandler skillets. These are usually smaller one-off bits that may not require their o…☆13Apr 15, 2020Updated 5 years ago
- Project that datamines zillow using Azure Cloud Services. Also demonstrates how to call into Azure Machine Learning. Read my blog: www.…☆10May 12, 2015Updated 10 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- The Wave theme for OXID eShop☆10Aug 7, 2023Updated 2 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- ☆11Jul 10, 2024Updated last year
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Nov 17, 2017Updated 8 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago