x0xr00t / sl0ppy-PrivescTaskCreatorView external linksLinks
sl0ppy-PrivescTaskCreator.ps1
☆40Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for sl0ppy-PrivescTaskCreator
Users that are interested in sl0ppy-PrivescTaskCreator are comparing it to the libraries listed below
Sorting:
- ☆26Aug 11, 2025Updated 6 months ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 9 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated 11 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- ☆13Jan 27, 2024Updated 2 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12May 23, 2024Updated last year
- ProxyWatch☆34Updated this week
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆37Jan 23, 2026Updated 3 weeks ago
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- ☆240Mar 29, 2025Updated 10 months ago
- ☆19Nov 28, 2024Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆30Feb 6, 2026Updated last week
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Simple C# Redirector☆93Aug 31, 2025Updated 5 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- ☆24May 17, 2022Updated 3 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆52Sep 24, 2025Updated 4 months ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 3 months ago
- results of scraping OneDrive from February 2022 - March 2025☆26Apr 29, 2025Updated 9 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated 3 weeks ago
- ☆176Apr 9, 2025Updated 10 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Aug 21, 2025Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 7 months ago
- PowerShell & Python tools developed for CTFs and certification exams☆69Aug 10, 2025Updated 6 months ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- A Rust template for writing Beacon Object Files (BOFs)☆87Updated this week
- ☆35Jan 13, 2026Updated last month
- A PoC for Early Cascade process injection technique.☆208Jan 30, 2025Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Mar 2, 2025Updated 11 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- BayesML: your first library for Bayesian machine learning☆16Jan 27, 2026Updated 2 weeks ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Dec 7, 2024Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆67Updated this week