☆10Feb 27, 2026Updated this week
Alternatives and similar repositories for plextrac-manager-util
Users that are interested in plextrac-manager-util are comparing it to the libraries listed below
Sorting:
- Archive of Metasploit CTF challenges.☆14Jan 21, 2022Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 7 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- TSheets API Documentation☆12Jan 18, 2024Updated 2 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- ☆18May 8, 2015Updated 10 years ago
- User manager for PureFTPd allows administrators to easily create, change, or delete 'virtual' PureFTPd users.☆10Jun 18, 2023Updated 2 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- ☆13Feb 20, 2026Updated last week
- This is a repo for a Power Automate cloud flow solution that allows the user to summarise Teams transcripts using GPT4.☆16Feb 24, 2025Updated last year
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago
- ☆13Jun 26, 2025Updated 8 months ago
- ☆10Oct 12, 2021Updated 4 years ago
- Remote browser service for all your AI Agent / Scraping needs - deployed in your Cloudflare account.☆16Jul 20, 2025Updated 7 months ago
- A Vulnerablity Radar That Runs With GIthub Actions☆44Updated this week
- Matrisea is a web-based Android reversing platform that provides high-fidelity virtual devices with powerful integrated tools☆10Mar 1, 2023Updated 3 years ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- Captcha Crack - pre OCR image enhancer☆18Jan 25, 2013Updated 13 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Work in progress to create an RFC that documents the OpenVPN protocol☆14Nov 24, 2025Updated 3 months ago
- An operator to keep all of your k3OS node config.yaml files neatly in sync across the cluster.☆10Mar 7, 2023Updated 2 years ago
- ☆11Jun 5, 2022Updated 3 years ago
- Docker Compose configuration for running n8n with PostgreSQL☆10Apr 13, 2025Updated 10 months ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- Immutable alternatives to built-in array operators☆12Aug 29, 2016Updated 9 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Google Apps Script automatically extracts events from your school's emails and adds them to a shared Google Calendar, making it easier to…☆15Jun 6, 2025Updated 8 months ago
- Elixir library to produce diff reports of two strings, or two lists of objects (of any kind)☆10Apr 28, 2025Updated 10 months ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago