0x68302A / merOS-virtLinks
Build and Interact with a Set of Virtual Machines
☆15Updated this week
Alternatives and similar repositories for merOS-virt
Users that are interested in merOS-virt are comparing it to the libraries listed below
Sorting:
- Decrypt encrypted SonicOSX firmware images☆15Updated 3 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- module for certexfil☆15Updated 2 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Kiddy - (linux) kernel identity spoofer☆13Updated last year
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- ☆9Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 5 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- History and analysis of Windows desktop images☆17Updated 4 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Companion Worm research☆15Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago