Bluecoat proxies URL filtering bypass PoC
☆14May 19, 2015Updated 10 years ago
Alternatives and similar repositories for BluecoatURLFilteringBypass
Users that are interested in BluecoatURLFilteringBypass are comparing it to the libraries listed below
Sorting:
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- A minimalistic way to run WAVSEP☆16May 14, 2018Updated 7 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29May 2, 2016Updated 9 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 2 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- Asynchronous exploit farm for attack-defence CTF☆22Nov 8, 2018Updated 7 years ago
- Clean public password dump files and store in ELK☆36Jan 24, 2018Updated 8 years ago
- Python for Hackers course sample codes.☆46Sep 30, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Extracting Syscall Stub, Modernized☆65Apr 2, 2022Updated 3 years ago