test
☆104Apr 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for vss-fr2system
Users that are interested in vss-fr2system are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆120Apr 22, 2026Updated 3 weeks ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 25, 2026Updated 3 weeks ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆70Feb 17, 2026Updated 3 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- ☆11Sep 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆26Aug 11, 2025Updated 9 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated last month
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- Bring your own Unwind Data Framework☆143Mar 15, 2026Updated 2 months ago
- Notion C2 Profile for Mythic☆46Apr 30, 2026Updated 2 weeks ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- A headless MCP server for IDA Pro and Ghidra☆85May 5, 2026Updated last week
- TLS fingerprint emulation upstream proxy replay any ClientHello☆46Apr 6, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- ☆28Jul 19, 2024Updated last year
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28May 4, 2026Updated 2 weeks ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆390May 12, 2026Updated last week
- Shellcode Loader Library.☆15Sep 21, 2025Updated 7 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- Telegram localStorage Security Vulnerability Proof-of-Concept☆14Aug 18, 2025Updated 9 months ago
- Windows KASLR bypass using prefetch side-channel☆181Apr 26, 2024Updated 2 years ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆22Updated this week
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆94Nov 6, 2025Updated 6 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- 7z exploit POC versions prior to 25.01☆32Aug 11, 2025Updated 9 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆46Dec 19, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 3 months ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- Ghidra decompiler in your browser☆96May 4, 2026Updated 2 weeks ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated last month
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆80Jun 11, 2024Updated last year
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- ClickForClickOnce - Generate configurable clickonce payloads☆94Apr 17, 2026Updated last month