Echidna-Pentest / EchidnaView external linksLinks
☆65Aug 24, 2025Updated 5 months ago
Alternatives and similar repositories for Echidna
Users that are interested in Echidna are comparing it to the libraries listed below
Sorting:
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Sep 13, 2022Updated 3 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- Shows your country flag, country ISO code, and IP address of your current location in the system tray.☆19Feb 3, 2026Updated 2 weeks ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Midjourney integration with Telegram Bot☆19Aug 31, 2023Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Jun 18, 2022Updated 3 years ago
- ☆33Apr 23, 2023Updated 2 years ago
- ☆31Jul 14, 2022Updated 3 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated last year
- Delete everything from anyone's repositories on GitHub!☆27Feb 13, 2022Updated 4 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Dec 5, 2023Updated 2 years ago
- Convert any text into your own handwriting☆41Sep 13, 2025Updated 5 months ago
- ☆65Sep 18, 2025Updated 5 months ago
- OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators☆29Updated this week
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 5 years ago
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- vMass Bot Vulnerability Scanner & Auto Exploiter Tool Written in Perl.☆209Jun 5, 2023Updated 2 years ago
- Игровой автомат на js☆15Sep 1, 2016Updated 9 years ago
- ☆10Mar 19, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- A Python tool to estimate the distance of an explosion in a video based on the sound delay between the flash and boom of the explosion☆34Sep 19, 2023Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- ☆32Oct 11, 2023Updated 2 years ago
- A set of javascript packages that generates fake data for you.☆34Mar 13, 2022Updated 3 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- ☆19Jun 9, 2016Updated 9 years ago
- A tutorial on how to create and deploy a VPN server on GCP, followed by deploying a private k8s cluster which connects only through the V…☆11Sep 4, 2021Updated 4 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 2 years ago
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 4 months ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 7 months ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- CTF writeups☆16Nov 20, 2025Updated 2 months ago
- Common google dorks and others you prolly donn know :P☆38Jul 28, 2014Updated 11 years ago