731 skills found · Page 1 of 25
gelstudios / Gitfitiabusing github commit history for the lulz
samyk / EvercookieProduces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.
firehol / Blocklist Ipsetsipsets dynamically updated with firehol's update-ipsets.sh script
google / RecaptchaPHP client library for reCAPTCHA, a free service to protect your website from spam and abuse.
ly4k / CertipyTool for Active Directory Certificate Services enumeration and abuse
t3l3machus / HoaxshellA Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
sensepost / RulerA tool to abuse Exchange services
itm4n / PrintSpooferAbusing impersonation privileges through the "Printer Bug"
UnaPibaGeek / CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
GhostPack / CertifyActive Directory certificate abuse.
dirkjanm / KrbrelayxKerberos relaying and unconstrained delegation abuse toolkit
SHANMUGAM070106 / Cursor Free Vip[Support 0.48.x](Reset Cursor AI MachineID & Auto Sign Up / In & Bypass Higher Token Limit)自动注册 Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machine. Please upgrade to pro. We have this limit in place to prevent abuse. Please let us know if you believe this is a mistake.
anttiviljami / Browser Autofill PhishingA simple demo of phishing by abusing the browser autofill feature
SafeBreach-Labs / PoolPartyA set of fully-undetectable process injection techniques abusing Windows Thread Pools
dirkjanm / PrivExchangeExchange your privileges for Domain Admin privs by abusing Exchange
matthieu-hackwitharts / Win32 Offensive CheatsheetWin32 and Kernel abusing techniques for pentesters
iangcarroll / Cookiemonster🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.
mxrch / Penglab🐧 Abuse of Google Colab for cracking hashes.
nongiach / Sudo Inject[Linux] Two Privilege Escalation techniques abusing sudo token
D4stiny / SpectreA Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.