☆27Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for EasyEnumeration
Users that are interested in EasyEnumeration are comparing it to the libraries listed below
Sorting:
- ☆200Jan 19, 2020Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- ☆49Sep 20, 2019Updated 6 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43May 18, 2024Updated last year
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago