Tinkering with bits and bytes
☆11Dec 14, 2024Updated last year
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Python Tool for Host Enumeration☆50Mar 24, 2017Updated 8 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆26Nov 15, 2017Updated 8 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- This repository contains code which allows to fetch your activity data from strava☆13Oct 24, 2024Updated last year
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Jun 11, 2024Updated last year
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Nov 12, 2013Updated 12 years ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- Turn your pain cave fans into smart fans!☆14Dec 24, 2023Updated 2 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- Android APK Resigner☆10Jul 13, 2016Updated 9 years ago