secure-77 / Certipy-DockerView external linksLinks
Certipy in Docker
☆13Mar 28, 2024Updated last year
Alternatives and similar repositories for Certipy-Docker
Users that are interested in Certipy-Docker are comparing it to the libraries listed below
Sorting:
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆19Feb 21, 2025Updated 11 months ago
- ☆14Apr 16, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated 11 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆38Jan 12, 2026Updated last month
- ☆26Aug 11, 2025Updated 6 months ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Windows Win32 Kernel Subsystem☆35Aug 23, 2025Updated 5 months ago
- Koppeling x Metatwin x LazySign☆216Aug 26, 2021Updated 4 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 9 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 10 months ago
- purplestorm writeup collection☆29Feb 7, 2026Updated last week
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- ☆60Apr 25, 2025Updated 9 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Dec 11, 2024Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- A C DLL that can control powershell☆51Dec 13, 2019Updated 6 years ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- Havoc C2 profile generator☆101Jul 15, 2025Updated 7 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- A persistent database + CLI for your BBOT scan data 🧡☆40Feb 5, 2026Updated last week
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- ☆125Dec 12, 2025Updated 2 months ago
- ☆29Oct 19, 2024Updated last year