☆25Oct 12, 2012Updated 13 years ago
Alternatives and similar repositories for PXEClient
Users that are interested in PXEClient are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 11 years ago
- ☆25Sep 17, 2025Updated 8 months ago
- [deprecated] see README☆42May 15, 2020Updated 6 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 4 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python 3 SimpleHTTPServer over HTTPS TLS with Basic Auth☆11Apr 9, 2018Updated 8 years ago
- ☆20Apr 21, 2020Updated 6 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Nov 30, 2016Updated 9 years ago
- Lutech TMS EHAT-NG☆14Jul 8, 2017Updated 8 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆12Jun 25, 2020Updated 5 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ELF/PE/Mach-O parsing library☆26Oct 10, 2024Updated last year
- BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063☆20Apr 17, 2020Updated 6 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 9 years ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- Example queries for joern☆18Feb 2, 2017Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Feb 24, 2026Updated 2 months ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 7 years ago
- ☆21May 14, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Scripts for Bro IDS and ELK Stack☆56Sep 2, 2015Updated 10 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- Broadcom CFE NAND dumper (uses `dn` command) - kinda crappy, use with care☆34Sep 8, 2023Updated 2 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Feb 23, 2021Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- ESXi Cyber Security Incident Response Script☆28Sep 4, 2024Updated last year
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆81Apr 11, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆30Aug 8, 2015Updated 10 years ago
- Authenticated SSRF in Grafana☆83Jun 24, 2024Updated last year
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 8 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- A search engine for content shared publicly via cloud storage services☆104Jun 17, 2024Updated last year
- PoC tool to demonstrate vulnerabilities in wireless input devices☆88Mar 24, 2017Updated 9 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago