☆14Mar 19, 2024Updated last year
Alternatives and similar repositories for malIDP
Users that are interested in malIDP are comparing it to the libraries listed below
Sorting:
- ☆12Jun 26, 2023Updated 2 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- ☆121Nov 21, 2024Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆18May 14, 2025Updated 9 months ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Impacket☆49Updated this week
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated 11 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- ☆22Jun 9, 2025Updated 8 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 3 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- KQL Queries☆33Feb 17, 2026Updated last week
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Decrypt mRemoteNG passwords☆65May 10, 2022Updated 3 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Obfuscate UDP traffic as RTP☆25Sep 25, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 5 months ago
- A COFF Loader written in Rust☆138Dec 1, 2025Updated 3 months ago