☆31Mar 21, 2023Updated 3 years ago
Alternatives and similar repositories for Emulation-Tools
Users that are interested in Emulation-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 2 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- ☆18Apr 3, 2023Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 3 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- ☆14Nov 29, 2021Updated 4 years ago
- Work in progress...☆472Feb 24, 2026Updated last month
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 3 months ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Dec 23, 2024Updated last year
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Jun 24, 2025Updated 9 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- CobaltStrike beacon written in golang☆27Apr 4, 2023Updated 2 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Mar 3, 2026Updated 3 weeks ago
- Tool for efficient directory enumeration☆64Jan 27, 2026Updated last month
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago