☆22Apr 11, 2025Updated last year
Alternatives and similar repositories for SMB-Write-Checker
Users that are interested in SMB-Write-Checker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Sep 1, 2025Updated 7 months ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- PowerShell & Python tools developed for CTFs and certification exams☆71Aug 10, 2025Updated 8 months ago
- ☆29Jun 18, 2025Updated 9 months ago
- ☆82Apr 28, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Manufacturing Truth since 1984☆12Jul 16, 2024Updated last year
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆68Oct 20, 2025Updated 5 months ago
- ☆53Mar 16, 2026Updated 3 weeks ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆111Aug 21, 2025Updated 7 months ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- External Playbooks for Public Access☆41Jan 31, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- ☆15Jan 2, 2026Updated 3 months ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- ☆16Aug 25, 2025Updated 7 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆122Nov 5, 2025Updated 5 months ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- ☆18Jan 9, 2025Updated last year
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆29Aug 24, 2025Updated 7 months ago
- Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages - in seconds.☆89Updated this week
- Node-Red node for M-Bus protocol☆12Sep 18, 2025Updated 6 months ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 5 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆11Dec 5, 2019Updated 6 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- Collection of exploits developed by your friendly clown☆13Oct 18, 2025Updated 5 months ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago