silentsignal / oracle_forms
Testing tools for Oracle Forms
☆10Updated 11 months ago
Alternatives and similar repositories for oracle_forms:
Users that are interested in oracle_forms are comparing it to the libraries listed below
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆54Updated last year
- Clone of the original project https://sourceforge.net/projects/sqsh/☆10Updated last year
- Testing tools for Oracle Forms☆45Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆52Updated 3 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆25Updated 2 years ago
- c# reverse shell poc☆26Updated 6 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- powershell tool for VM evasion☆43Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆69Updated 3 months ago
- ☆26Updated last year
- ☆27Updated last year
- Curated list of well-developed C# Offensive Tools☆20Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated last year
- ☆13Updated 5 years ago
- ☆54Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆11Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last week
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆9Updated 2 years ago