sashathomas / evil-jeaView external linksLinks
A small WinRM client designed for interacting with JEA endpoints.
☆13Aug 29, 2024Updated last year
Alternatives and similar repositories for evil-jea
Users that are interested in evil-jea are comparing it to the libraries listed below
Sorting:
- a minimalistic winrm client written in python☆25May 15, 2025Updated 8 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 6 months ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆18Dec 18, 2025Updated last month
- Minecraft mod that allow you to add an unlimited amount of your music as music discs.☆10Sep 6, 2025Updated 5 months ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- ☆43Jul 9, 2024Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆90Aug 21, 2025Updated 5 months ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated last year
- Awesome deals on Black Friday: Apps, SaaS, Books, Courses, etc.☆11Nov 14, 2023Updated 2 years ago
- MtnMesh GitHub Pages☆15Updated this week
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 3 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Interactive boids simulation in 2D and 3D using Bevy and Rust☆11Sep 17, 2025Updated 4 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆14Apr 29, 2019Updated 6 years ago
- Python decoder for ACARS messages, roughly inspired by wireshark☆14Mar 26, 2019Updated 6 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- ☆13Dec 12, 2022Updated 3 years ago
- A fork of Bevy Hanabi, the GPU-driven VFX system for Bevy, with improved performance and functionality☆16Feb 4, 2026Updated last week
- How to use math formulas in GitHub Markdown documents☆11May 10, 2018Updated 7 years ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- ☆12Apr 20, 2025Updated 9 months ago
- ☆10Aug 9, 2024Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- ☆60Apr 25, 2025Updated 9 months ago
- Public release for b01lers CTF 2021. Thanks for playing!☆10Apr 10, 2021Updated 4 years ago
- I updated the exploit code by Project Zero to gain root shell on iOS devices that I own. Deleted the previous repo and pushing in new one…☆13Dec 18, 2016Updated 9 years ago
- ☆12Dec 22, 2023Updated 2 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- ☆13Sep 4, 2025Updated 5 months ago