Block or Report
Block or report pdolinic
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLanguage
Sort by: Recently starred
Starred repositories
a strictly RFC 4510 conforming LDAP V3 pure Python client. The same codebase works with Python 2. Python 3, PyPy and PyPy3
JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application. Also includes a C2 for executing custom Java…
A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin
A service that waits for security notices from wid.cert-bund.de and wid.lsi.bayern.de and sends configurable email notifications
Enumerate and disable common sources of telemetry used by AV/EDR.
Escalate Service Account To LocalSystem via Kerberos
SkyperTHC / curlshell
Forked from irsl/curlshellreverse shell using curl
A centralized resource for previously documented WDAC bypass techniques
HiddenVM — Use any desktop OS without leaving a trace.
DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replication-Get-Changes-In-Filtered-Set.
A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).
Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and environment variables. Dumps, detects and dissasemble hooks, s…
Real fucking shellcode encryptor & obfuscator tool
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
A tool for checking the security hardening options of the Linux kernel
DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.
Pass-thru web server for traffic redirection
Simple shellcode injection in Nim encrypted in XOR
A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.
A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.
Microsoft SharePoint Server Elevation of Privilege Vulnerability