skylightcyber / soygun
☆10Updated 3 years ago
Alternatives and similar repositories for soygun:
Users that are interested in soygun are comparing it to the libraries listed below
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆11Updated 9 months ago
- parsers to make life easier☆12Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆17Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 3 weeks ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- ☆19Updated 4 years ago
- leaking net-ntlm with webdav☆24Updated 3 years ago
- visually see issues with supported cipher suites☆15Updated 8 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- Python C2 with JScript Implant☆14Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year