Download files out of open AWS buckets
☆38Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for tadpole
Users that are interested in tadpole are comparing it to the libraries listed below
Sorting:
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Mar 7, 2021Updated 5 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Agar.io bot for automatically gaining experience in agar.io☆11May 14, 2018Updated 7 years ago
- Multi-threaded web application directory bruteforcer☆28Feb 4, 2019Updated 7 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 10 months ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- With Selenium headless browsing and CAPTCHA solving☆43Mar 22, 2022Updated 3 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Extract transform load CLI tool for extracting small and middle data volume from sources (databases, csv files, xls files, gspreadsheets)…☆11Mar 1, 2026Updated last week
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago
- Advanced reconnaissance utility☆995Nov 20, 2023Updated 2 years ago
- Search for available domain from expireddomains.net☆34Apr 29, 2018Updated 7 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- RealTime Motion Capture Toolbox for Matlab☆10Apr 11, 2016Updated 9 years ago
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- SPA: Efficient User-Preference Alignment against Uncertainty in Medical Image Segmentation (ICCV 2025)☆14Sep 26, 2025Updated 5 months ago