PDump is a project for dumping leaked credentials from DEHASHED
☆17Jan 21, 2024Updated 2 years ago
Alternatives and similar repositories for PDump
Users that are interested in PDump are comparing it to the libraries listed below
Sorting:
- ☆19Dec 18, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆19Mar 31, 2025Updated 11 months ago
- ☆26Nov 25, 2025Updated 3 months ago
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 5 months ago
- ☆12Jun 26, 2023Updated 2 years ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Fitness OSINT Resources☆15Jul 21, 2023Updated 2 years ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 3 weeks ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆78Jul 25, 2025Updated 7 months ago
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆42Jul 8, 2020Updated 5 years ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Oct 30, 2024Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆48Jul 28, 2025Updated 7 months ago
- Hacking resources for the Exegol project☆42Feb 1, 2026Updated last month
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated last year
- ☆12Aug 22, 2017Updated 8 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- Clone an Android Virtual Device for easy distribution through the Android SDK Manager.☆16Jul 9, 2012Updated 13 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago