woanware / application-restriction-bypassesView external linksLinks
A set of compiled application restriction bypasses
☆30Mar 15, 2017Updated 8 years ago
Alternatives and similar repositories for application-restriction-bypasses
Users that are interested in application-restriction-bypasses are comparing it to the libraries listed below
Sorting:
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 10 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- ☆45Jul 18, 2016Updated 9 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- WhichCDN allows to detect if a given website is protected by a Content Delivery Network☆150May 5, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- A sample IE BHO for logging Internet Explorer's POST data.☆10Dec 29, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- A DNS tunnel utilizing the Burp Collaborator☆104Oct 8, 2019Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Fileless web browser information extraction☆221Apr 23, 2018Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 6 years ago
- C++ library for detecting Visual C++ runtimes on Windows XP and later.☆18Jul 7, 2014Updated 11 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago