A collaborative, multi-platform, red teaming framework
☆13Jan 19, 2020Updated 6 years ago
Alternatives and similar repositories for Apfell
Users that are interested in Apfell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 10 months ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- ☆68May 22, 2023Updated 2 years ago
- Miscellaneous Hacks☆18Feb 26, 2026Updated last month
- Authenticate sudo sessions using OS X’s Security dialog☆49Apr 3, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PoC for old Binder vulnerability (based on P0 exploit)☆13Oct 27, 2020Updated 5 years ago
- Gem mysql2 agent for huginn☆14Jun 5, 2017Updated 8 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- Example osquery configuration for Linux servers using eBPF for events☆16Aug 27, 2021Updated 4 years ago
- Command line scripts for managing munki.☆15Jun 30, 2011Updated 14 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆18Jan 3, 2017Updated 9 years ago
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- ☆25Feb 20, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 5 years ago
- This script is designed to analyze a website is vulnerable to an XMLRPC DoS attack.☆14Jul 3, 2023Updated 2 years ago
- A lightweight authentication proxy for HTTP services☆17Nov 28, 2023Updated 2 years ago
- ☆11Dec 7, 2025Updated 3 months ago
- Windows Exploit List☆17Jun 13, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- List of android RATs☆14Jan 2, 2021Updated 5 years ago
- A set of programs to download, upload, convert, analyze and create a policy for FortiGate firewalls☆15Mar 6, 2025Updated last year
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- portable google spreadsheet bash client for easily piping/replacing data between spreadsheets☆13May 28, 2020Updated 5 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- The okta-aws-cli-assume-role auth tool for humans☆13Jun 5, 2025Updated 9 months ago
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- ☆25Mar 22, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- ☆21Jan 12, 2012Updated 14 years ago
- Create Logstash events from the Okta API!☆19Nov 29, 2022Updated 3 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- 是最近总结的一套渗透测试的时候的面试题,不定时更新,有错之地,自查校对,勿喷。☆19Apr 3, 2019Updated 6 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago