PHREAKERS-MADHUREH / TSL-OPOK
This config made in Phreakers madhureh
☆8Updated 5 years ago
Alternatives and similar repositories for TSL-OPOK:
Users that are interested in TSL-OPOK are comparing it to the libraries listed below
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Updated last month
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Spider or repeater to find all links.☆13Updated 3 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆14Updated 2 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A collection of personal ZAP scripts☆13Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- A first look at browser-based Cryptojacking☆15Updated 6 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Advanced RDP Hacking Tool☆7Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Simple and efficient file shredding☆14Updated 5 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- Automation platform for open source intelligence☆13Updated last year