Simple C# Port Scanner (Multi-Threaded)
☆51Jan 23, 2021Updated 5 years ago
Alternatives and similar repositories for C-Sharp-Port-Scan
Users that are interested in C-Sharp-Port-Scan are comparing it to the libraries listed below
Sorting:
- Abertay CMP202 Project☆36May 7, 2021Updated 4 years ago
- ☆54Jun 1, 2024Updated last year
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Various *nix tools built as statically-linked binaries☆3,619Aug 21, 2023Updated 2 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated last year
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago
- Netcat for windows 32/64 bit☆775Apr 3, 2024Updated last year
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- ☆18Jan 9, 2026Updated last month
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆24Dec 13, 2019Updated 6 years ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆115Feb 23, 2025Updated last year
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- ☆1,156Apr 21, 2021Updated 4 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Oct 24, 2025Updated 4 months ago
- Active Directory Wordlists☆111May 28, 2020Updated 5 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 6 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Feb 24, 2020Updated 6 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆37Jun 4, 2024Updated last year
- D2R MapHack☆11Jun 10, 2022Updated 3 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Jun 22, 2020Updated 5 years ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆36Apr 21, 2019Updated 6 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- The ultimate phishing tool with 38 websites available!☆14Nov 7, 2024Updated last year
- فایل های دوره ی آموزش گیمپ به زبان فارسی و کاملا رایگان از سایت آواسام با تدریس سام نیکزاد☆11Jan 1, 2024Updated 2 years ago
- Powershell script to extract information from boot PXE☆156Apr 26, 2019Updated 6 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆915Feb 28, 2024Updated 2 years ago