Subdomain finder
☆15Jul 16, 2024Updated last year
Alternatives and similar repositories for Lepus
Users that are interested in Lepus are comparing it to the libraries listed below
Sorting:
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- ☆20Nov 1, 2022Updated 3 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- Artifact monitoring that ensures fairplay☆78Jan 29, 2025Updated last year
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Docker-container that connects to OpenVPN-server and provides SOCKS5-proxy for easy application-specific VPN-tunneling☆26May 10, 2021Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Hacking challenges to learn web archive security.☆35Jun 23, 2017Updated 8 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- ☆10Feb 28, 2023Updated 3 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- simple tool for finding javascript files from webapps☆10Apr 20, 2023Updated 2 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Loading python modules and packages from a remote machine☆10Aug 16, 2019Updated 6 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- Auto-Hacking-USB..... Explains Itself!☆13Jan 16, 2015Updated 11 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- ☆16Updated this week