Certipy in Docker
☆13Mar 28, 2024Updated last year
Alternatives and similar repositories for Certipy-Docker
Users that are interested in Certipy-Docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 10 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Koppeling x Metatwin x LazySign☆217Aug 26, 2021Updated 4 years ago
- Entra ID Password Protection Banned Password Lists☆18Apr 16, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 5 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Mar 17, 2026Updated last week
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- purplestorm writeup collection☆30Mar 16, 2026Updated last week
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- ☆14Apr 16, 2022Updated 3 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆124May 12, 2021Updated 4 years ago
- ☆71Mar 8, 2026Updated 2 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆12Oct 31, 2024Updated last year
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- ☆26Aug 11, 2025Updated 7 months ago
- ☆15Jun 27, 2024Updated last year
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- ☆41Feb 20, 2025Updated last year
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Learning material for completely newcomers in the field of BOFs☆15Apr 11, 2020Updated 5 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- A persistent database + CLI for your BBOT scan data 🧡☆42Mar 19, 2026Updated last week
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- ☆16Apr 17, 2024Updated last year
- ☆74Jun 17, 2025Updated 9 months ago