☆55Mar 5, 2026Updated last month
Alternatives and similar repositories for BucketHoarder
Users that are interested in BucketHoarder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vhost scanning☆37Nov 1, 2023Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 7 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Use ESC1 to perform a makeshift DCSync and dump hashes☆210Nov 2, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kill AV/EDR leveraging BYOVD attack☆400Jul 11, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆61Feb 4, 2025Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- This repository is for the Testing ASP.NET ViewState with YSoNet (YSoSerial.NET) workshop.☆24Dec 17, 2025Updated 4 months ago
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 3 years ago
- ☆28Sep 4, 2024Updated last year
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 4 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆48Sep 18, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆148Dec 23, 2022Updated 3 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆208Jan 12, 2025Updated last year
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 6 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆375Mar 24, 2026Updated last month
- ☆19Sep 30, 2024Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 4 months ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago