☆24Nov 11, 2025Updated 3 months ago
Alternatives and similar repositories for YaksasCSC-Lab
Users that are interested in YaksasCSC-Lab are comparing it to the libraries listed below
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- ☆10Aug 13, 2018Updated 7 years ago
- ☆19Apr 10, 2022Updated 3 years ago
- Just another AD training, but free.☆16Aug 9, 2025Updated 7 months ago
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆23Feb 28, 2026Updated last week
- Notes of my OSCP study plan☆465Jun 29, 2022Updated 3 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Feb 8, 2023Updated 3 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- Collection of tools written in vb6 - ProcessKiller, DriveManager, USBManager, LocalRDP, HTTPServer☆20Jul 2, 2017Updated 8 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Aug 4, 2024Updated last year
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 4 years ago
- Penetration Testing/Security Cheatsheets☆191Oct 31, 2015Updated 10 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆31Aug 3, 2021Updated 4 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- The Pentester's Swiss Army Knife☆26Jan 25, 2020Updated 6 years ago
- ☆58Jun 28, 2020Updated 5 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Custom queries list for BloodHound☆31Jul 8, 2025Updated 8 months ago
- Web-based check for Windows privesc vulnerabilities☆140May 14, 2023Updated 2 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago
- Penetration testing course by Z0F.☆53Oct 6, 2021Updated 4 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Adhoc scripts☆30Feb 12, 2017Updated 9 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Advanced Penetration Testing Framework | Powered by Bash☆31Oct 31, 2024Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- ☆29May 14, 2019Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Nov 8, 2020Updated 5 years ago
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 4 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- ☆38Dec 10, 2022Updated 3 years ago
- Used for the osce exam preparation☆74Mar 3, 2016Updated 10 years ago