Security tool to quickly audit Public Box files and folders.
☆55Sep 29, 2019Updated 6 years ago
Alternatives and similar repositories for PandorasBox
Users that are interested in PandorasBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31May 31, 2019Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course☆16Dec 27, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- Plugin providing native AF_Packet support for Zeek.☆33Oct 22, 2025Updated 5 months ago
- The modular distributed fingerprinting engine☆220Aug 6, 2018Updated 7 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Automatically extracts API Keys from APK files☆14Feb 1, 2022Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- ☆21Dec 4, 2019Updated 6 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Oct 28, 2025Updated 5 months ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- 🔍 A simple tool to obtain long lists of ips from domains using goroutines☆26Jul 29, 2019Updated 6 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- Escapes content for prevention of XSS attacks.☆13Jun 24, 2016Updated 9 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 5 years ago