A Pentesters Confluence Keyword Scanner
☆17Dec 3, 2024Updated last year
Alternatives and similar repositories for conkeyscan
Users that are interested in conkeyscan are comparing it to the libraries listed below
Sorting:
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 3 years ago
- SettingContent-MS File Execution vulnerability in Windows 10☆24Jan 7, 2026Updated last month
- A curated list of awesome AI Red Teaming resources and tools.☆29May 12, 2023Updated 2 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- Ultimate File Transfer List☆67Sep 20, 2022Updated 3 years ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆154Jan 3, 2026Updated last month
- ☆37Sep 29, 2020Updated 5 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Jul 18, 2021Updated 4 years ago
- ☆10Updated this week
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Oct 3, 2024Updated last year
- ☆32Feb 3, 2026Updated 3 weeks ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated last year
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 30+ other AI services in seconds☆16Feb 16, 2026Updated last week
- ☆84Aug 26, 2024Updated last year
- A simple, reliable and reasonably fast network capture analyzer.☆25Feb 7, 2026Updated 2 weeks ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- German translation of the Microsoft Elevation of Privilege card game along with notes and examples☆10Jan 9, 2016Updated 10 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- 5 Projects based on Unsupervised learning☆11Feb 10, 2021Updated 5 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- A very fast whois crawler☆40Dec 19, 2019Updated 6 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 7 years ago
- MSVC C++ resource example☆11Jun 28, 2018Updated 7 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Update an ECS service to use a new Docker image☆13Updated this week
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- ☆20Sep 6, 2025Updated 5 months ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago