☆22Jan 29, 2025Updated last year
Alternatives and similar repositories for SMB_Inspector
Users that are interested in SMB_Inspector are comparing it to the libraries listed below
Sorting:
- ☆13Dec 24, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- small wiki engine based on static reST files and git for versionning☆25Oct 26, 2015Updated 10 years ago
- Suffices of German town and village names☆10May 4, 2020Updated 5 years ago
- A simple kernel module who hides a file by hooking the getdents64 syscall.☆10Aug 27, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- hiding in plain sight: part 2☆45Jul 11, 2024Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Typst Dateien für Schulmaterial (Mathematik/Informatik)☆16Jun 28, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- ActionScript 3, MXML, and Flex CSS3 parser☆10May 12, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆16Aug 25, 2025Updated 6 months ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- Customizable charts made with TikZ and LaTeX3☆14Feb 11, 2023Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..