willshiao / Patch
šļø Retroactively fix your Zoom recordings with a click! Won 1st Place, Best Use of GCP, Best Start-Up, and Best Entrepreneurial Hack at Citrus Hack 2020.
ā10Updated 3 years ago
Alternatives and similar repositories for Patch:
Users that are interested in Patch are comparing it to the libraries listed below
- š” A security research tool with shodan integrationā25Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commandsā32Updated 5 years ago
- DNS server limitation mapperā26Updated 6 years ago
- generates weak passwords based on current dateā41Updated 8 months ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)ā24Updated 5 years ago
- Standardizing Security Titlesā13Updated 2 years ago
- Microsoft Flow Attack Frameworkā23Updated 5 years ago
- LetMeOutOfYour.net Resourcesā20Updated 4 years ago
- Deploy redteam infrastructureā16Updated 3 years ago
- edge --> powerpoint --> remote-file --> shellā12Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using eā¦ā52Updated 10 months ago
- Experimenting with destructive file attacks in Goā18Updated 5 years ago
- C2 over webā8Updated 5 years ago
- Rosie the Pivoterā17Updated 6 years ago
- Do the unexpected with AD GPO processingā9Updated 5 years ago
- Useful books, links, blogs, etc.ā14Updated 7 years ago
- Leveraging CVE-2018-19788 without root shellsā18Updated 6 years ago
- Small, one-off scripts for security related stuff I've written over timeā35Updated this week
- This document proposes a way of standardising the structure, language, and grammar used in security policies.ā25Updated 7 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.ā8Updated 7 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.ā13Updated last year
- Collection of things made during my SLAE 32-bit journeyā14Updated 3 years ago
- Ansible scripts to build an attack boxā22Updated 6 years ago
- IDS/IPS malware download evasionā15Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017ā11Updated 7 years ago
- Toy version of the sweet32 attackā14Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you providedā33Updated 3 years ago
- ā10Updated 6 months ago
- Library of traffic redirectorsā26Updated 4 years ago
- Provides access to libhashcatā30Updated 10 months ago