☆20Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for ADLab
Users that are interested in ADLab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- O Vansor Forensic Collector é um script de automação desenvolvido para coleta, validação e análise de dados em servidores Linux.☆12Sep 9, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- Make your first Pull Request on Hacktoberfest 2023. Don't forget to spread love and if you like give us a ⭐️☆11Oct 27, 2023Updated 2 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆29Oct 29, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆62Apr 1, 2026Updated last week
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Resolve offsets, gadgets and symbols from NTKernel☆60Jan 15, 2026Updated 2 months ago
- ☆25Feb 9, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆27Feb 11, 2023Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- 🗄️ Collection and organization of information ℹ️☆19Mar 21, 2026Updated 2 weeks ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Running Azure Functions in a Docker Container basic example☆10Apr 17, 2019Updated 6 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆113Jan 26, 2026Updated 2 months ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Aadhar Data Extraction is a computer vision-based tool that uses the YOLO model for object detection and the EasyOCR library for optical …☆11Apr 17, 2023Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago