gRPC client for the Merlin Server
☆28Apr 17, 2025Updated 11 months ago
Alternatives and similar repositories for merlin-cli
Users that are interested in merlin-cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-exploitation agent for Merlin☆210Apr 16, 2025Updated 11 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Clean up unused AWS resources☆13Mar 31, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Analyse binaries for missing security features, information disclosure and more...☆88Aug 7, 2023Updated 2 years ago
- Library for packaging/extracting folders in tar.gz archives.☆13Jan 20, 2024Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- D-DALLE brings together the world’s artist creativity using AI and Blockchain. D-DALLE's smart contracts constitute a fully-functional ar…☆13Nov 10, 2022Updated 3 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- a golang library to use aes encrypt easier.☆18Nov 30, 2021Updated 4 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- ☆13Aug 13, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- Derive Display for simple enums automagically☆24Feb 17, 2022Updated 4 years ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated 2 years ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆14Feb 24, 2024Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- ☆45Mar 22, 2026Updated 2 weeks ago
- CLI script to use GadgetProbe as a library to generate serialized payloads of DNS callbacks to free DNSbin to probe what Java classpaths …☆14Jun 8, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- CVE-2022-39197 RCE POC☆13Oct 22, 2022Updated 3 years ago
- SMB Audit Tool you were looking for☆24Jun 16, 2023Updated 2 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆158Nov 7, 2023Updated 2 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 11 months ago
- A PoC .NET-specific process injection tool☆58Mar 17, 2024Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year
- Vibe Editing – Asynchronous Voice-to-Edit Flow with AI Agents in Cursor (AI Tinkerers Toronto - May 2025 Meetup: AGENTS at Ada)☆13May 22, 2025Updated 10 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This repository is intended as a comprehensive guide to prepare for interviews focused on generative AI. It serves as a one-stop resource…☆11Dec 13, 2024Updated last year
- ☆15Feb 9, 2022Updated 4 years ago
- An evil MCP server used for redteam testing☆30Updated this week
- Westernal is a social media based on songs, you can share posts that includes part of a song, the whole song or music videos with your fo…☆15Mar 11, 2025Updated last year
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Simple BOF to read the protection level of a process☆119May 10, 2023Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Aug 9, 2024Updated last year