A tool to abuse Exchange services
☆12Mar 18, 2024Updated 2 years ago
Alternatives and similar repositories for ruler
Users that are interested in ruler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- DSE & PG bypass via BYOVD attack☆79Jul 12, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🧙♂️✨ Covenants protocol helps Contracts, Organizations (DFOs, DAOs), or regular people to build and manage cross AMMs financial applica…☆10Apr 24, 2024Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- Collection of slides☆33Aug 20, 2025Updated 7 months ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆17Jul 27, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 11 months ago
- Notion C2 Profile for Mythic☆42Mar 3, 2026Updated last month
- Get original URLs from shortened ones.☆16Sep 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆23Jun 17, 2024Updated last year
- ☆16Apr 6, 2021Updated 5 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated 2 months ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- Contracts for the flyp.me platform☆13Oct 3, 2017Updated 8 years ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆53Mar 16, 2026Updated 3 weeks ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- ☆19Oct 11, 2022Updated 3 years ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆110Aug 18, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Oct 20, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Dec 6, 2022Updated 3 years ago
- ☆18Dec 23, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 4 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆27Mar 17, 2024Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year