tijme / binariesLinks
A mirror of several precompiled standalone red-teaming tools.
☆18Updated 2 years ago
Alternatives and similar repositories for binaries
Users that are interested in binaries are comparing it to the libraries listed below
Sorting:
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆51Updated 3 years ago
- offensive notes & resources☆43Updated 3 months ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91Updated 5 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- ☆54Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- named pipe server with impersonation☆59Updated 6 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- A tool for creating proxy dll for hijacking☆42Updated 8 months ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆31Updated 2 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Loads a custom dll in system32 via diaghub.☆76Updated 5 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆18Updated 4 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- ☆19Updated 4 years ago