Ekultek / tadpoleView external linksLinks
Download files out of open AWS buckets
☆38Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for tadpole
Users that are interested in tadpole are comparing it to the libraries listed below
Sorting:
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Mar 7, 2021Updated 4 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- A simple XSS finding tool☆110Nov 9, 2018Updated 7 years ago
- Multi-threaded web application directory bruteforcer☆28Feb 4, 2019Updated 7 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated last month
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Machine assisted dossiers☆19Oct 12, 2017Updated 8 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 9 months ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- AnDroidInject0r is a Python script to inject existing Android applications with a Meterpreter payload. It can be used during penetrating …☆17Feb 22, 2021Updated 4 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆19Jun 1, 2021Updated 4 years ago
- Extract transform load CLI tool for extracting small and middle data volume from sources (databases, csv files, xls files, gspreadsheets)…☆11Dec 17, 2025Updated last month
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 7 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- Official repository for Characterization of tumor heterogeneity through segmentation-free representation learning on multiplexed imaging …☆14Sep 28, 2025Updated 4 months ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Advanced reconnaissance utility☆992Nov 20, 2023Updated 2 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- Security Capture the Flag Platform☆33Jan 11, 2023Updated 3 years ago
- SPA: Efficient User-Preference Alignment against Uncertainty in Medical Image Segmentation (ICCV 2025)☆14Sep 26, 2025Updated 4 months ago