☆46Nov 22, 2025Updated 3 months ago
Alternatives and similar repositories for HIVE_NAVAL_SYSTEM
Users that are interested in HIVE_NAVAL_SYSTEM are comparing it to the libraries listed below
Sorting:
- ☆15Apr 17, 2025Updated 10 months ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- ☆11Jan 28, 2025Updated last year
- ShadowDigger: A Python CLI tool for SQLite DB management and doxing. It allows data creation, insertion, and querying, catering to doxing…☆10Jul 9, 2023Updated 2 years ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆593Nov 23, 2025Updated 3 months ago
- ☆59Oct 24, 2024Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆131May 12, 2025Updated 9 months ago
- ☆54Oct 13, 2025Updated 4 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆39Sep 15, 2022Updated 3 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- WonderCMS Authenticated RCE - CVE-2023-41425☆25Dec 30, 2024Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- Wallarm Product Documentation☆11Updated this week
- ☆11Updated this week
- ☆72Jan 31, 2025Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆38Dec 9, 2025Updated 2 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆493Feb 13, 2023Updated 3 years ago
- ☆16Jan 20, 2026Updated last month
- A Moodle Scanner☆43Nov 16, 2024Updated last year
- Everything from my OSEP study.☆189Jan 4, 2026Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Apr 11, 2025Updated 10 months ago
- ☆61Jun 28, 2025Updated 8 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 3 months ago
- A very very very simple tool to compile folder to fake ps4/ps5 pkg☆16Dec 3, 2023Updated 2 years ago
- A set of administrative scripts that backup/restore the Library's Atlassian Confluence/JIRA database, filesystem, and creation of a test …☆13Mar 3, 2022Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Analogue SIP modules☆11Mar 2, 2015Updated 11 years ago
- Full Featured Arduino library for the SI4713 FM transmitter chip☆14May 7, 2022Updated 3 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 3 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago