Network Infrastructure Penetration Testing Tool
☆15Oct 26, 2017Updated 8 years ago
Alternatives and similar repositories for sparta
Users that are interested in sparta are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom pentesting tools☆16Dec 11, 2019Updated 6 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆91Mar 27, 2018Updated 8 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- ☆25Feb 28, 2024Updated 2 years ago
- ☆11Dec 10, 2023Updated 2 years ago
- One-Click Root for Andyroid.☆18Feb 4, 2020Updated 6 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆20Feb 25, 2019Updated 7 years ago
- Schematics & Firmware for self-tuning portable RF Jammer☆12Feb 2, 2018Updated 8 years ago
- ☆13Mar 20, 2023Updated 3 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple Play/Pause controls for Spotify Web App☆16Oct 13, 2020Updated 5 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- OSINT Framework☆19Mar 31, 2021Updated 5 years ago
- A project inspired by BadUSB paper, USB Rubber Ducky and Samy Kamkar's project "USBDriveBy". Making the teensy microcontroller an evil li…☆12Mar 19, 2016Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- A WIP for connecting to ANCS.☆34Sep 23, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Nov 24, 2016Updated 9 years ago
- Project to link RTL_433 output to Home Assistant☆12Feb 11, 2018Updated 8 years ago
- RADIO Mesh Network☆14Sep 9, 2018Updated 7 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- ☆19Sep 5, 2021Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆26Jun 28, 2020Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Jun 23, 2021Updated 4 years ago