Simple C# Port Scanner (Multi-Threaded)
☆51Jan 23, 2021Updated 5 years ago
Alternatives and similar repositories for C-Sharp-Port-Scan
Users that are interested in C-Sharp-Port-Scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Abertay CMP202 Project☆36May 7, 2021Updated 4 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- Various *nix tools built as statically-linked binaries☆3,641Aug 21, 2023Updated 2 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Notes on ECPPT☆25Dec 22, 2018Updated 7 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆99Jun 29, 2022Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Netcat for windows 32/64 bit☆778Apr 3, 2024Updated last year
- ☆13Jul 25, 2023Updated 2 years ago
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆24Dec 13, 2019Updated 6 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- SSTI Payload Generator☆93Aug 8, 2022Updated 3 years ago
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Collection of ctf write-up source codes.☆16Jun 28, 2021Updated 4 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,415Feb 24, 2023Updated 3 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Powershell script to extract information from boot PXE☆157Apr 26, 2019Updated 6 years ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- ☆18Jan 9, 2026Updated 2 months ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆126Jun 22, 2020Updated 5 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆15Jun 4, 2025Updated 9 months ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- Active Directory Wordlists☆112May 28, 2020Updated 5 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Scripts for Pentesting☆13May 29, 2025Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- ☆15Apr 17, 2025Updated 11 months ago