Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)
☆26Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for OxidBindings
Users that are interested in OxidBindings are comparing it to the libraries listed below
Sorting:
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Dead simple C# project to take a screenshot.☆19Jan 14, 2019Updated 7 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- Machine Learning Network Share Password Hunting Toolkit☆130Mar 21, 2020Updated 5 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- From directory deletion to SYSTEM shell☆111Apr 24, 2020Updated 5 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- All TMF files that I extracted from Microsoft PDBs.☆14Jun 29, 2019Updated 6 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆32Jun 10, 2020Updated 5 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆12Feb 19, 2026Updated last week