Group Policy Hijacking
☆32Apr 6, 2018Updated 7 years ago
Alternatives and similar repositories for GP_Hijack
Users that are interested in GP_Hijack are comparing it to the libraries listed below
Sorting:
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- A simple polymorphic engine☆21Jun 5, 2020Updated 5 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago
- ☆22May 29, 2020Updated 5 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago