Summon Demon Linux
☆39May 31, 2024Updated last year
Alternatives and similar repositories for Summon
Users that are interested in Summon are comparing it to the libraries listed below
Sorting:
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- Demon Pentest Shell☆15Aug 4, 2021Updated 4 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆282Dec 17, 2023Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- ☆13Mar 17, 2021Updated 5 years ago
- This Repository is for random Knicks and knacks - in relation to PowerShell scripts I have created for one task or another.☆16Jan 13, 2025Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A script to add Animated Avatars and Banner Images to Discord Bots☆13Mar 19, 2024Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Script to gather Auditpol data forest wide as well as various other Audit Metadata from DC's, Servers and Workstations.☆12Jul 6, 2017Updated 8 years ago
- Various Atlassian Confluence related tools☆19Updated this week
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Tool to Disable User Lock☆25Nov 22, 2022Updated 3 years ago
- Generates an HTML view of the contents of a PCAP file☆14Jan 29, 2021Updated 5 years ago
- Unicode Security Toolkit☆21Updated this week
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Repository for AsBuiltReport Microsoft DHCP module☆15Jan 31, 2026Updated last month
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Set-up and configuration tool for a Network impairment node using Linux Traffic Control (tc) with Network Emulation (netem)☆13Nov 24, 2016Updated 9 years ago
- turn your confluence space into a static site☆12Feb 14, 2026Updated last month
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- ☆17Jul 19, 2021Updated 4 years ago