☆15Mar 27, 2019Updated 7 years ago
Alternatives and similar repositories for AD-Attack-Defense
Users that are interested in AD-Attack-Defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆12Jun 10, 2025Updated 9 months ago
- Tutorial on deploying Singer taps and targets on Kubernetes with Argo Workflows☆12Mar 31, 2021Updated 4 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆28Jan 6, 2026Updated 2 months ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Monitoring Kubernetes With Prometheus☆16Jul 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆13Sep 28, 2024Updated last year
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- ☆15Apr 29, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆10Oct 6, 2025Updated 5 months ago
- Projeto voltado ao desenvolvimento de uma aplicação web intencionalmente vulnerável.☆11Feb 25, 2023Updated 3 years ago
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆38Mar 10, 2026Updated 2 weeks ago
- Awesome Pentest Reports☆19Jun 16, 2023Updated 2 years ago
- [MIRROR] Parsec in a Docker container☆33Mar 6, 2026Updated 3 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆40Apr 5, 2024Updated last year
- Simple demo of Samy Kamkar's "inspector is open" detection☆23Feb 15, 2017Updated 9 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- ☆17Jul 19, 2021Updated 4 years ago
- 获取域控权限方法枚举☆13May 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆11Dec 9, 2025Updated 3 months ago
- bypass facebook ssl pinning on android☆12Mar 9, 2019Updated 7 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- Windows NTLMSSP library☆11Oct 13, 2020Updated 5 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 5 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- KSecurity 1.0 Linux Security Monitor is a project aimed at enhancing server security by monitoring Apache server logs and all system conn…☆12Sep 26, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆19Mar 13, 2022Updated 4 years ago
- Upload Fuzzer for Burpsuite☆17Aug 23, 2018Updated 7 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Injection of managed code into non-managed Windows applications☆28Jan 17, 2019Updated 7 years ago
- Supplemental repository for Learn content on CircleCI☆34May 3, 2024Updated last year
- A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts☆20Mar 30, 2025Updated last year
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Jun 6, 2024Updated last year