Security tool to quickly audit Public Box files and folders.
☆54Sep 29, 2019Updated 6 years ago
Alternatives and similar repositories for PandorasBox
Users that are interested in PandorasBox are comparing it to the libraries listed below
Sorting:
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- ☆39Aug 5, 2016Updated 9 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Checklist and tools for increasing security of Apache Airflow☆32May 7, 2021Updated 4 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31May 31, 2019Updated 6 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 3 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- Python script that gets Twitter users' tweets location☆109Apr 10, 2018Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Multithreading search through Bitbucket git repositories for sensitive data (see TruffleHog/regexChecks.py), digging deep into commit his…☆17Mar 21, 2018Updated 7 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year