sisoc-tokyo / mimikatz_detectionView external linksLinks
☆12Mar 24, 2018Updated 7 years ago
Alternatives and similar repositories for mimikatz_detection
Users that are interested in mimikatz_detection are comparing it to the libraries listed below
Sorting:
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated last month
- Like Russian roulette, but for your kernel.☆14Jul 13, 2025Updated 7 months ago
- ☆82Dec 29, 2020Updated 5 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24May 4, 2016Updated 9 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- ☆27Jul 10, 2023Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last week
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- Optimize PNG image files by removing unnecessary PNG chunks thus losslessly reducing file size.☆11Mar 31, 2016Updated 9 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Консольное приложение для скачивания архивных материалов с сайта https://cgamos.ru☆13Nov 7, 2025Updated 3 months ago
- Introduction to Python Course Lectures and Supportive Articles☆10Mar 18, 2023Updated 2 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated last month
- A simple 'This day in history' API written in Python, that pulls data from wikipedia☆17May 22, 2025Updated 8 months ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 2 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- ☆11Dec 26, 2023Updated 2 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Copinya custom Unix Shell☆10Mar 16, 2019Updated 6 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- ☆11Mar 8, 2025Updated 11 months ago
- Wifu is a wifi data analysis tool written in Python, it is based on the output of Kismet (https://www.kismetwireless.net/) files. Wifu pa…☆10Jun 11, 2015Updated 10 years ago
- VS Code syntax support for MySQL☆12Oct 7, 2019Updated 6 years ago
- A Vue App for quickly generating KML Search Grids☆13Nov 12, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year