☆72Apr 24, 2023Updated 2 years ago
Alternatives and similar repositories for email-prediction-asterisks
Users that are interested in email-prediction-asterisks are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- Microsoft Exchange password spray tool with proxy support.☆39Jul 9, 2021Updated 4 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆115Apr 19, 2022Updated 3 years ago
- BoB Web Application Security Project☆220Dec 14, 2025Updated 2 months ago
- Download all of a given user's public Pastebin pastes☆33Apr 16, 2025Updated 10 months ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- TrinitySeal patcher.☆10Nov 26, 2019Updated 6 years ago
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- Online test is available 👉☆11Feb 20, 2026Updated 2 weeks ago
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆58Sep 24, 2023Updated 2 years ago
- RTF Crash POC Python 3.11 Windows 10☆46Mar 7, 2023Updated 2 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- ☆33Aug 29, 2022Updated 3 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Sep 23, 2022Updated 3 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, res…☆19Nov 16, 2023Updated 2 years ago
- WebSetting☆16Jul 19, 2022Updated 3 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year