Manage Engine Decrypter
☆24Oct 17, 2022Updated 3 years ago
Alternatives and similar repositories for Zoinks
Users that are interested in Zoinks are comparing it to the libraries listed below
Sorting:
- ☆16Jun 13, 2022Updated 3 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆13Aug 25, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- ☆13Jul 30, 2021Updated 4 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- Go reverse shell for Win/Linux/OSX☆17May 15, 2019Updated 6 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 9 years ago
- Metasploit Framework☆29Dec 11, 2013Updated 12 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- golang实现的PE解析工具☆15Nov 15, 2022Updated 3 years ago
- Spawns a reverse TCP shell on the machine its run on☆15Mar 29, 2014Updated 11 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- ☆199Jan 30, 2026Updated last month
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible lin…☆15Nov 25, 2019Updated 6 years ago
- A Command Line Tool That Insults You When You Type Wrong Commands☆21Mar 17, 2024Updated last year
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 4 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago