Giter Site home page Giter Site logo

xcalibure2's Projects

0click_htb icon 0click_htb

This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE

40k-nuclei-templates icon 40k-nuclei-templates

40,000+ Nuclei templates for security scanning and detection across diverse web applications and services

a-red-teamer-diaries icon a-red-teamer-diaries

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

aardwolf icon aardwolf

Asynchronous RDP client for Python (headless)

ad-honeypot-autodeploy icon ad-honeypot-autodeploy

Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.

adcscoercepotato icon adcscoercepotato

another technique for coercing machine authentication but specific for ADCS server

adcskiller icon adcskiller

An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer

adeleginator icon adeleginator

A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory

adiskreader icon adiskreader

Async Python library to parse local and remote disk images.

admin2sys icon admin2sys

Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM

adpentest icon adpentest

Windows Active DIrectory Pentesting documentation.

adrecon icon adrecon

ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment.

adsips icon adsips

PowerShell module to interact with Active Directory using ADSI and the System.DirectoryServices namespace (.NET Framework)

agartha icon agartha

[web] a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to spot authentication/authorization issues, and converts Http requests to Javascript for further XSS exploitation and more.

al-khaser icon al-khaser

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

amnesiac icon amnesiac

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.