tijme / binaries
A mirror of several precompiled standalone red-teaming tools.
☆18Updated 2 years ago
Alternatives and similar repositories for binaries:
Users that are interested in binaries are comparing it to the libraries listed below
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- This code was used for the blogpost on secjuice.☆42Updated 5 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- ☆54Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- material for exploit development☆17Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆24Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- Presentaciones de congresos☆52Updated 9 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆34Updated 3 years ago
- Posts about different topics☆36Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆56Updated last year
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆31Updated last year
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆17Updated 4 years ago
- ☆20Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- offensive notes & resources☆41Updated last month
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago