Python tool to find vulnerable AD object and generating csv report
☆14Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for FoxTerrier
Users that are interested in FoxTerrier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last month
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆94May 14, 2022Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- ☆23Oct 19, 2023Updated 2 years ago
- ☆22Mar 4, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated 2 weeks ago
- ☆34Jul 6, 2024Updated last year
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆67Mar 7, 2026Updated 3 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DC27 MULTI PASS Badge☆17Sep 6, 2019Updated 6 years ago
- ☆179Oct 21, 2025Updated 5 months ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- ☆28Aug 9, 2020Updated 5 years ago