A tool to abuse Exchange services
☆12Mar 18, 2024Updated 2 years ago
Alternatives and similar repositories for ruler
Users that are interested in ruler are comparing it to the libraries listed below
Sorting:
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- DSE & PG bypass via BYOVD attack☆79Jul 12, 2025Updated 8 months ago
- 🧙♂️✨ Covenants protocol helps Contracts, Organizations (DFOs, DAOs), or regular people to build and manage cross AMMs financial applica…☆11Apr 24, 2024Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- Collection of slides☆33Aug 20, 2025Updated 7 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 7 months ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Checks whether a Windows server according to security best practices as defined in the CIS Distribution-Independent Windows Benchmark☆23Sep 15, 2025Updated 6 months ago
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 11 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- Get original URLs from shortened ones.☆16Sep 20, 2023Updated 2 years ago
- ☆23Jun 17, 2024Updated last year
- ☆16Apr 6, 2021Updated 4 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Contracts for the flyp.me platform☆13Oct 3, 2017Updated 8 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆54Updated this week
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- ☆19Oct 11, 2022Updated 3 years ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- ☆11Oct 20, 2022Updated 3 years ago
- ☆18Dec 23, 2024Updated last year
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Claude MCP server to perform analysis on ROADrecon data☆49Mar 30, 2025Updated 11 months ago