Don't expect much :) Just expect to learn new things!
☆64Mar 11, 2021Updated 4 years ago
Alternatives and similar repositories for EazyPeazy
Users that are interested in EazyPeazy are comparing it to the libraries listed below
Sorting:
- ☆61Jan 4, 2022Updated 4 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Jan 21, 2020Updated 6 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Knowledge Base of Exploitation Techniques☆60Apr 30, 2025Updated 10 months ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 6 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- This DevOps Diary is a series of story telling me as DevOps Engineer working for at company. Sharing Tools, tricks, tips and tutorial on …☆12Oct 23, 2022Updated 3 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- CTFd plugin allowing for individual Docker containers per team☆26Jun 27, 2022Updated 3 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Capture The Flag | Cyber SEA GAME 2019 | Writeup☆12Nov 24, 2019Updated 6 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 7 months ago
- ☆14Sep 29, 2021Updated 4 years ago
- Pentesting notes☆19Jan 31, 2026Updated last month
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- ☆16May 3, 2021Updated 4 years ago
- A collection of my adventures through hackthebox.eu☆38Apr 25, 2021Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Telegram cli tool for bot notifications☆17Feb 24, 2021Updated 5 years ago
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago