☆51Mar 29, 2022Updated 3 years ago
Alternatives and similar repositories for Windows-AD-attacking
Users that are interested in Windows-AD-attacking are comparing it to the libraries listed below
Sorting:
- This repo contains the slides of the y redteaming sessions on my Youtube channel.☆21Dec 9, 2021Updated 4 years ago
- ☆13Jan 11, 2024Updated 2 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Collection of Stuff☆14Nov 2, 2023Updated 2 years ago
- ☆14Oct 12, 2021Updated 4 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- ☆410Jun 27, 2024Updated last year
- ☆12Apr 8, 2022Updated 3 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Feb 21, 2022Updated 4 years ago
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Scanner Tool For XSS Vulnerability☆83Apr 13, 2022Updated 3 years ago
- Fuzzing with the generated argument and environment variable☆10Jul 14, 2022Updated 3 years ago
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 4 months ago
- A PlayBook for OSWP & Wireless Pentest☆47Jul 28, 2024Updated last year
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 7 months ago
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- ☆13Mar 28, 2024Updated last year
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- Common weakness enumeration library for Python (maintained fork of https://github.com/Julian-Nash/cwe )☆15Aug 29, 2024Updated last year
- ☆11Aug 18, 2023Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- This repo is a curated list of places I consider for weekends in Athens with my kid.☆11Dec 19, 2021Updated 4 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Cyber-Physical Systems Guide☆15Jul 25, 2021Updated 4 years ago