sparcflow / SlashPaulHoldingsView external linksLinks
Custom scripts used during the scenario
☆21Apr 5, 2021Updated 4 years ago
Alternatives and similar repositories for SlashPaulHoldings
Users that are interested in SlashPaulHoldings are comparing it to the libraries listed below
Sorting:
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- ☆61Mar 16, 2018Updated 7 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- The FASTEST way to parse Email☆17Dec 24, 2021Updated 4 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated 11 months ago