Edu4rdSHL / microsoft-giveaway-booksLinks
Microsoft give away books downloader in Linux or Windows
☆13Updated 3 years ago
Alternatives and similar repositories for microsoft-giveaway-books
Users that are interested in microsoft-giveaway-books are comparing it to the libraries listed below
Sorting:
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
 - Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
 - a collection of bash script and python to automate ZAP Security Tests☆11Updated 5 years ago
 - Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
 - Windows productivity tweaks☆15Updated 5 years ago
 - ☆17Updated last year
 - psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 5 years ago
 - Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 6 years ago
 - A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
 - A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆55Updated 6 years ago
 - SWF Vulnerability & Information Scanner☆19Updated 6 years ago
 - It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
 - PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45Updated 6 years ago
 - Python script that automate the process of generating various reverse shells.☆16Updated 4 years ago
 - Shodan Port Scanner☆44Updated 5 years ago
 - Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Updated 6 years ago
 - Exploit for win10 SMB3.1☆17Updated 5 years ago
 - Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 3 months ago
 - Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
 - YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
 - Tool useful to discover services behind unknown ports☆13Updated 4 years ago
 - Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated 4 months ago
 - Interactive Post Exploitation Tool☆37Updated 6 years ago
 - This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
 - Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated last month
 - A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
 - Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
 - Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
 - Monitoring Registry and File Changes in Windows☆69Updated last year
 - Get latest Exploit Databases notification on your Desktop☆16Updated 5 years ago