Terribad PrivEsc enumeration script for Windows systems
☆15Oct 23, 2020Updated 5 years ago
Alternatives and similar repositories for Clippy
Users that are interested in Clippy are comparing it to the libraries listed below
Sorting:
- Listen to the soothing sounds of attacks and anomalies detected by the Signal Sciences web protection platform.☆10Oct 1, 2018Updated 7 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- ☆13Oct 12, 2019Updated 6 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- HackTheBox High Definition Badge Generator☆28Jul 1, 2019Updated 6 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Cape Town BSides Capture the Flag by Nclose https://bsidescapetown.co.za/☆12Dec 20, 2019Updated 6 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- This is a advanced ransomware example made in AutoIt☆34May 22, 2016Updated 9 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- ☆16May 13, 2021Updated 4 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- A small cli utility for interacting with Hack the Box☆35Dec 8, 2022Updated 3 years ago
- Free e-books, built from markdown☆11Jul 15, 2024Updated last year
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- ☆509May 27, 2018Updated 7 years ago
- Command-line viewer for AIS data through GPSD☆11Aug 27, 2014Updated 11 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Animated version of the "starmap-northern" script☆10May 9, 2018Updated 7 years ago
- CNVD-2021-10543:MessageSolution 企业邮件归档管理系统 EEA 存在信息泄露漏洞☆13Mar 28, 2021Updated 4 years ago
- ☆10Mar 15, 2021Updated 4 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- LibML is a library for loading, configuring, and running machine learning models in production. It provides a simple high-level API for C…☆13Mar 14, 2025Updated 11 months ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago