☆26Jan 27, 2022Updated 4 years ago
Alternatives and similar repositories for EzpzSharepoint
Users that are interested in EzpzSharepoint are comparing it to the libraries listed below
Sorting:
- A set of scripts to facilitate HTTP interception on mobile apps☆20Dec 9, 2025Updated 3 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆61Sep 28, 2022Updated 3 years ago
- ☆18Nov 18, 2022Updated 3 years ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Feb 19, 2026Updated 2 weeks ago
- buldDNS: A DNS scanner for large-scale measurement☆22Jan 22, 2026Updated last month
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- Some Useful Tricks for Pentest Android and iOS Apps☆160Nov 10, 2025Updated 3 months ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- My Leetcode Problems' Solutions☆11Sep 7, 2023Updated 2 years ago
- SMB password sprayer☆20Jan 19, 2019Updated 7 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 2 months ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 3 months ago
- ☆27Apr 22, 2025Updated 10 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated 2 months ago
- ☆39Mar 25, 2021Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆34Jul 18, 2025Updated 7 months ago
- Discover hidden debugging parameters and uncover web application secrets☆246Feb 4, 2026Updated last month
- A GO module to get domain name from SSL certificates when an IP address is provided.☆33Apr 14, 2023Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- The fastest stacked-branch workflow for Git. Interactive TUI, smart PRs, safe undo. Written in Rust.☆58Updated this week
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- My notes from courses,books ..etc☆48Nov 26, 2025Updated 3 months ago
- learning case to prepare OSWE☆36Nov 4, 2019Updated 6 years ago
- Generate wordlists from Github repositories☆106Nov 25, 2023Updated 2 years ago
- WolvCtf-2023-Challenges-Public☆12Apr 13, 2023Updated 2 years ago
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago