Piosec / GolcondaView external linksLinks
☆14Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for Golconda
Users that are interested in Golconda are comparing it to the libraries listed below
Sorting:
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 3 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- ☆28Jun 2, 2021Updated 4 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Moved to HappyHackingSpace/pirebok☆14Updated this week
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- ☆17Nov 9, 2018Updated 7 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Nov 22, 2021Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Mar 6, 2025Updated 11 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆79Sep 8, 2025Updated 5 months ago
- This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilita…☆10Jul 18, 2023Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆100Mar 14, 2019Updated 6 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Jul 5, 2023Updated 2 years ago
- cobalt strike tools☆31Nov 4, 2021Updated 4 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- A command line tool and a library to generate TLS certificates for development purposes.☆36Jul 5, 2021Updated 4 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 6 months ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Feb 7, 2021Updated 5 years ago
- Tools to assess the DNS security of web applications☆127Oct 5, 2022Updated 3 years ago