Python tool to find vulnerable AD object and generating csv report
☆14Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for FoxTerrier
Users that are interested in FoxTerrier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 months ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- A nim port of C5pider's Ekko project.☆17Oct 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 3 years ago
- ☆94May 14, 2022Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆118Sep 30, 2024Updated last year
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- ☆22Mar 4, 2025Updated last year
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- ☆34Jul 6, 2024Updated last year
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆54Mar 10, 2026Updated last month
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 4 years ago
- ☆33Apr 7, 2020Updated 6 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆189Oct 21, 2025Updated 6 months ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆79Mar 7, 2026Updated 2 months ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- Dumping processes using a kernel-mode driver.☆20Nov 10, 2021Updated 4 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 6 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 5 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆165Sep 11, 2020Updated 5 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago