Edu4rdSHL / microsoft-giveaway-books
Microsoft give away books downloader in Linux or Windows
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for microsoft-giveaway-books
- Automate Recon process using Shell Scripting☆11Updated 2 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆15Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 5 years ago
- ☆17Updated 9 months ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- automated penetration toolkit☆13Updated 8 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- scripts for generating password wordlists☆8Updated 6 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- ☆29Updated 4 years ago