Microsoft Flow Attack Framework
☆23Nov 14, 2019Updated 6 years ago
Alternatives and similar repositories for OVERFLOW
Users that are interested in OVERFLOW are comparing it to the libraries listed below
Sorting:
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Hugo repository for main ironpeak.be website.☆12Feb 17, 2026Updated 2 weeks ago
- ☆34Jan 22, 2025Updated last year
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- ☆20Updated this week
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- Anything ( :-) ) you can do with a MS-Windows file (but faster)☆15Nov 23, 2023Updated 2 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 6 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 7 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Feb 13, 2021Updated 5 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 2 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- How to mix C and Go with cgo on Windows☆22Jul 30, 2017Updated 8 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆49Apr 22, 2017Updated 8 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- Scripting language for derps☆20Jun 16, 2017Updated 8 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- Use CLR to inject all the .NET apps☆184Apr 17, 2021Updated 4 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago