test
☆61Apr 25, 2026Updated this week
Alternatives and similar repositories for vss-fr2system
Users that are interested in vss-fr2system are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆107Updated this week
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 10, 2026Updated 2 weeks ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆69Feb 17, 2026Updated 2 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 9 months ago
- ☆11Sep 23, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆26Aug 11, 2025Updated 8 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆77Apr 11, 2026Updated 2 weeks ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- Notion C2 Profile for Mythic☆45Mar 3, 2026Updated last month
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- TLS fingerprint emulation upstream proxy replay any ClientHello☆43Apr 6, 2026Updated 3 weeks ago
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated 3 weeks ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated 2 months ago
- ☆27Jul 19, 2024Updated last year
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.☆376Updated this week
- Shellcode Loader Library.☆15Sep 21, 2025Updated 7 months ago
- Precompiled binaries for windows & Linux☆34Apr 19, 2026Updated last week
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Telegram localStorage Security Vulnerability Proof-of-Concept☆14Aug 18, 2025Updated 8 months ago
- Windows KASLR bypass using prefetch side-channel☆178Apr 26, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆17Jan 4, 2026Updated 3 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆92Nov 6, 2025Updated 5 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- 7z exploit POC versions prior to 25.01☆33Aug 11, 2025Updated 8 months ago
- Open KLara Project☆35Feb 12, 2026Updated 2 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆45Dec 19, 2025Updated 4 months ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated last week
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated last week
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆79Jun 11, 2024Updated last year
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- WallEscape vulnerability in util-linux☆55Mar 30, 2024Updated 2 years ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆294Mar 29, 2026Updated 3 weeks ago
- psexecsvc - a python implementation of PSExec's native service implementation☆301Mar 24, 2026Updated last month