Simple C# Port Scanner (Multi-Threaded)
☆51Jan 23, 2021Updated 5 years ago
Alternatives and similar repositories for C-Sharp-Port-Scan
Users that are interested in C-Sharp-Port-Scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Abertay CMP202 Project☆36May 7, 2021Updated 4 years ago
- ☆54Jun 1, 2024Updated last year
- Various *nix tools built as statically-linked binaries☆3,664Aug 21, 2023Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Notes on ECPPT☆25Dec 22, 2018Updated 7 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆99Jun 29, 2022Updated 3 years ago
- Netcat for windows 32/64 bit☆784Apr 3, 2024Updated 2 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- ☆13Jul 25, 2023Updated 2 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆24Dec 13, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆18Oct 14, 2020Updated 5 years ago
- SSTI Payload Generator☆92Aug 8, 2022Updated 3 years ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- ☆1,159Apr 21, 2021Updated 4 years ago
- Collection of ctf write-up source codes.☆16Jun 28, 2021Updated 4 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,434Feb 24, 2023Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Powershell script to extract information from boot PXE☆159Apr 26, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆30Jan 12, 2023Updated 3 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆126Jun 22, 2020Updated 5 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆15Jun 4, 2025Updated 10 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆750Feb 24, 2026Updated last month
- Active Directory Wordlists☆111May 28, 2020Updated 5 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Mar 15, 2026Updated 3 weeks ago
- ☆15Apr 17, 2025Updated 11 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆12Jan 5, 2021Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- ☆221Jul 26, 2020Updated 5 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,296Aug 20, 2024Updated last year
- socks4 reverse proxy for penetration testing☆645Jul 12, 2018Updated 7 years ago