ricardojba / noPacView external linksLinks
CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
☆34Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for noPac
Users that are interested in noPac are comparing it to the libraries listed below
Sorting:
- ☆18Jul 3, 2020Updated 5 years ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Feb 16, 2023Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Map remote .NET assemblies to memory for further invocation.☆40Oct 22, 2021Updated 4 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Jun 23, 2023Updated 2 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Feb 2, 2022Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- cloud-based interactive security exercises☆14Jul 13, 2020Updated 5 years ago
- ☆16May 9, 2016Updated 9 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- ☆26May 22, 2021Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆167Apr 22, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- Red Team C2 and Post Exploitation code☆34Jul 8, 2025Updated 7 months ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- Process Ghosting Tool☆176Jun 22, 2021Updated 4 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Apr 20, 2021Updated 4 years ago
- ☆65Mar 15, 2024Updated last year
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago