Linux Post-Exploitation tools wrapper
☆20Mar 21, 2023Updated 3 years ago
Alternatives and similar repositories for crimson_lisp
Users that are interested in crimson_lisp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- This is a MD5 password/passphrase brute force tool☆10Mar 13, 2021Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- AV Evasion Techniques☆83Jul 28, 2022Updated 3 years ago
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆82Feb 11, 2025Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆33Aug 16, 2023Updated 2 years ago
- ☆13Mar 12, 2022Updated 4 years ago
- Mirror of the "Raid faster - recover better" (rfrb) tool by Sabine Seufert and Christian Zoubek, is a recovery tool for different RAID le…☆12May 15, 2015Updated 10 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- python text steganography library☆11Nov 29, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 8 months ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Telsca is an open-source tool for scraping Telegram data. Extract messages, user info, and media files, saving them in CSV or JSON format…☆12Aug 4, 2024Updated last year
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆91Feb 5, 2021Updated 5 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Web Application Security Testing Tools☆252Mar 13, 2024Updated 2 years ago
- ☆13Jul 25, 2023Updated 2 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 4 years ago
- End-to-End Encrypted Messaging via GitHub Gists☆30Apr 14, 2025Updated last year
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Source code of WeLeakInfo.☆10Jul 31, 2020Updated 5 years ago
- A wacky exploitation framework written in pure python3.☆22Mar 24, 2024Updated 2 years ago
- An Apostrophe website that demonstrates various techniques and will be linked to in documentation, stackoverflow answers, etc. Check it o…☆15Aug 4, 2025Updated 8 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- My OSCP notes. Might help you! Happy to get feedback to improve this package.☆26Jun 24, 2025Updated 9 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆19Mar 4, 2022Updated 4 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year