sl0ppy-PrivescTaskCreator.ps1
☆41Oct 8, 2025Updated 7 months ago
Alternatives and similar repositories for sl0ppy-PrivescTaskCreator
Users that are interested in sl0ppy-PrivescTaskCreator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Aug 11, 2025Updated 9 months ago
- ☆13Jan 27, 2024Updated 2 years ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Better version of SharpPick☆14Aug 29, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆64Apr 13, 2025Updated last year
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Payload Generation Workflow☆41Jul 18, 2025Updated 10 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆60Feb 16, 2026Updated 3 months ago
- Windows Active DIrectory Pentesting documentation.☆20Jun 14, 2024Updated last year
- results of scraping OneDrive from February 2022 - March 2025☆26Apr 29, 2025Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- ☆250Mar 29, 2025Updated last year
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 2, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆19Nov 28, 2024Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆40Jan 23, 2026Updated 3 months ago
- Azure Post Exploitation Framework☆247Oct 27, 2025Updated 6 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Dec 2, 2024Updated last year
- Panoptes Endpoint Detection and Response Solution☆44Mar 7, 2026Updated 2 months ago
- Simple C# Redirector☆95Aug 31, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ProxyWatch☆50Apr 25, 2026Updated 3 weeks ago
- C2 writen in Rust & Go powered by Tor network.☆157Oct 30, 2025Updated 6 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆113Apr 26, 2026Updated 3 weeks ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆142Mar 28, 2025Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆83Apr 16, 2026Updated last month
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆177Apr 9, 2025Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Jan 18, 2025Updated last year
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆79Mar 31, 2026Updated last month
- ☆16Aug 25, 2025Updated 8 months ago