Tinkering with bits and bytes
☆11Dec 14, 2024Updated last year
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 12 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- ☆15May 14, 2019Updated 6 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Deletes old email from my Gmail accounts☆15Oct 13, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Webkit uxss exploit (CVE-2017-7089)☆63Oct 3, 2017Updated 8 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Jan 8, 2018Updated 8 years ago
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆27Nov 15, 2017Updated 8 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- A template for phaser games written in CLJS, has the right configs to enable REPL driven dev.☆21Jan 7, 2023Updated 3 years ago
- Python Tool for Host Enumeration☆50Mar 24, 2017Updated 8 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- ☆19Nov 28, 2024Updated last year
- Draws properties of Arcade Physics bodies. Phaser 2/CE☆19Jun 25, 2019Updated 6 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- QCTF School 2018. Developed with ♥ by Hackerdom team☆12Dec 3, 2018Updated 7 years ago
- Tarot-based narrative generation☆21Oct 13, 2018Updated 7 years ago