This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.
☆26Dec 8, 2017Updated 8 years ago
Alternatives and similar repositories for McAfeeSiteList
Users that are interested in McAfeeSiteList are comparing it to the libraries listed below
Sorting:
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Information Gathering Tool☆24Aug 16, 2013Updated 12 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- (Moved to https://gitlab.com/Explorer09/usb_vaccine) USB malware immunity script and hidden files revealer.☆13Aug 8, 2024Updated last year
- ☆16Apr 4, 2015Updated 10 years ago
- ☆18Feb 2, 2026Updated last month
- Simple Software Vulnerability Language (SSVL)☆14Jan 21, 2015Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- A simple python library to interact with Microsoft Graph and Office 365 API☆18Dec 13, 2018Updated 7 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆172Jan 27, 2019Updated 7 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- [Firefox] SOP bypass PoC for CVE-2015-7214 (MFSA 2015-149)☆13Apr 28, 2016Updated 9 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Imports an LDAP file from Active Directory for SQL based offline reconnisance☆55Jun 1, 2016Updated 9 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Execute a shell command within Cloud Run☆31Jul 7, 2022Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆29Jan 4, 2016Updated 10 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- PowerShell Empire docker build☆23Jun 27, 2016Updated 9 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago