DenizParlak / hayatView external linksLinks
Hayat is a script for report and analyze Google Cloud Platform resources.
☆81Jan 7, 2020Updated 6 years ago
Alternatives and similar repositories for hayat
Users that are interested in hayat are comparing it to the libraries listed below
Sorting:
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- Python script for collecting and visualising Google Cloud Platform IAM permissions☆51Apr 23, 2017Updated 8 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆553May 26, 2023Updated 2 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆18Jan 31, 2024Updated 2 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last week
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Nov 18, 2023Updated 2 years ago
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- wordpress hash cracker .☆66Sep 7, 2021Updated 4 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- DNCI - Dot Net Code Injector☆148Jan 11, 2021Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago