Subdomain finder
☆15Jul 16, 2024Updated last year
Alternatives and similar repositories for Lepus
Users that are interested in Lepus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 4 months ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- Expose your Kubernetes resources to the world!☆11Dec 1, 2020Updated 5 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆12Feb 23, 2015Updated 11 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- My talks and papers☆41Nov 24, 2025Updated 4 months ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆38Apr 9, 2021Updated 5 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated 3 weeks ago
- ☆33Jun 19, 2021Updated 4 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 6 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 3 years ago
- A little tool to play with Outlook☆206Nov 11, 2021Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Jul 11, 2023Updated 2 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Docker-container that connects to OpenVPN-server and provides SOCKS5-proxy for easy application-specific VPN-tunneling☆26May 10, 2021Updated 4 years ago
- Multi-threading wget golang☆13Mar 13, 2024Updated 2 years ago
- ☆35Oct 8, 2022Updated 3 years ago
- CNNVD 漏洞收集☆18Jul 18, 2023Updated 2 years ago
- ☆12Apr 22, 2022Updated 3 years ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆14Mar 30, 2022Updated 4 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- 使用浏览器爬虫获取网站全链接扫描log4j2漏洞 / Use a browser crawler to get the full link of the website and scan the log4j2 vulnerability☆13Mar 31, 2022Updated 4 years ago
- ☆15Mar 21, 2025Updated last year
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 3 years ago