Short handy snippets from the @mwrlabs team
☆20Jan 30, 2018Updated 8 years ago
Alternatives and similar repositories for gists
Users that are interested in gists are comparing it to the libraries listed below
Sorting:
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 8 months ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Data exfiltration using reflective DNS resolution covert channel☆53Jan 10, 2018Updated 8 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Obfuscated Penetration Testing PowerShell scripts☆151Nov 9, 2024Updated last year
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- Extract WinSCP Credentials from any Windows System or winscp config file☆22Jul 10, 2025Updated 7 months ago
- ☆29Jul 6, 2017Updated 8 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Some .ps1 scripts for pentesting☆140Jan 6, 2026Updated last month
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- BGP Route Leaks Detection☆71Dec 7, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- A repository with toy implementations of MSCHAPv2, MPEE and WPA/2 to understand EAP better☆38Apr 18, 2019Updated 6 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- NSA headline generator☆32Feb 11, 2014Updated 12 years ago