H0j3n / EazyPeazyView external linksLinks
Don't expect much :) Just expect to learn new things!
☆64Mar 11, 2021Updated 4 years ago
Alternatives and similar repositories for EazyPeazy
Users that are interested in EazyPeazy are comparing it to the libraries listed below
Sorting:
- Collection Of Reverse Shell that can easily generate using Python3☆59Jan 25, 2024Updated 2 years ago
- ☆61Jan 4, 2022Updated 4 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Jan 21, 2020Updated 6 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 6 months ago
- Knowledge Base of Exploitation Techniques☆60Apr 30, 2025Updated 9 months ago
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated last month
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 6 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- CTFd plugin allowing for individual Docker containers per team☆26Jun 27, 2022Updated 3 years ago
- Capture The Flag | Cyber SEA GAME 2019 | Writeup☆12Nov 24, 2019Updated 6 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Feb 16, 2025Updated last year
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 4 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 6 months ago
- Pentesting notes☆19Jan 31, 2026Updated 2 weeks ago
- ☆16May 3, 2021Updated 4 years ago
- ☆18May 18, 2025Updated 8 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- A collection of my adventures through hackthebox.eu☆38Apr 25, 2021Updated 4 years ago
- List of possible Linux backdoors☆14Aug 7, 2020Updated 5 years ago
- Telegram cli tool for bot notifications☆17Feb 24, 2021Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Feb 14, 2017Updated 9 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago