Knowledge is power
☆86Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for Dump
Users that are interested in Dump are comparing it to the libraries listed below
Sorting:
- ☆13Oct 29, 2014Updated 11 years ago
- Build locally, deploy to any cloud, Automate all configurations...☆17Mar 25, 2020Updated 5 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Some Of MY TOOLS☆11Jul 4, 2024Updated last year
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- PHP Unserialize Check - Burp Scanner Extension☆18Mar 15, 2018Updated 7 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- RDP POC☆19Jun 1, 2019Updated 6 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- ☆21Jan 4, 2022Updated 4 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Tool development for monitoring packets in local networks.☆18Nov 7, 2016Updated 9 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Mar 2, 2020Updated 6 years ago
- This repository will contain python scripts for hackers and pentesters☆25Mar 11, 2022Updated 3 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- A tool to enumerate network services☆24Oct 30, 2019Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆293Feb 28, 2018Updated 8 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- collection of articles/books about programing☆587Dec 20, 2023Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Pentesting Cheatsheets and Guides☆124Jul 20, 2017Updated 8 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆23Mar 11, 2015Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- ☆27Apr 16, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Repository for GitHub Copilot☆14Jul 20, 2021Updated 4 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago