Lutech TMS EHAT-NG
☆13Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for EHAT-NG
Users that are interested in EHAT-NG are comparing it to the libraries listed below
Sorting:
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- A collection of code snippets used in blog posts.☆53Aug 29, 2025Updated 6 months ago
- Forked from jsfuck: jsf$ck - Write any JavaScript without parenthesis, using +![]{}$`☆23Jul 21, 2016Updated 9 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆56Jan 31, 2019Updated 7 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- ☆142May 24, 2024Updated last year
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Real-time Asset Monitor☆11Mar 6, 2023Updated 3 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- MAGENTO implementation - CARD Processing @mobilPay☆11May 15, 2025Updated 9 months ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago