Lutech TMS EHAT-NG
☆13Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for EHAT-NG
Users that are interested in EHAT-NG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆56Jan 31, 2019Updated 7 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- A collection of code snippets used in blog posts.☆54Aug 29, 2025Updated 6 months ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆75Aug 29, 2014Updated 11 years ago
- ☆57Aug 7, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 4 months ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy…☆13Oct 20, 2017Updated 8 years ago
- Shell script for converting an input file containing one or more sslscan results into HTML tables.☆13Jul 1, 2020Updated 5 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- ☆13May 17, 2016Updated 9 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- Encase Script to parse harddrive for MFT data☆16Jun 17, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generates an HTML view of the contents of a PCAP file☆14Jan 29, 2021Updated 5 years ago
- Sharing my BITS☆13Feb 23, 2018Updated 8 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Create Raspberry Pi 3G Hotspot and WLAN-Accesspoint☆16Sep 3, 2015Updated 10 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- Tools for fingerprinting and exploiting Amazon cloud infrastructures☆498Nov 10, 2022Updated 3 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago