☆46Nov 22, 2025Updated 5 months ago
Alternatives and similar repositories for HIVE_NAVAL_SYSTEM
Users that are interested in HIVE_NAVAL_SYSTEM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Apr 17, 2025Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 11 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- Inject RDPThief into memory with PowerShell.☆66Jan 21, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆22Mar 18, 2024Updated 2 years ago
- ☆61Oct 24, 2024Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- ☆10Oct 1, 2019Updated 6 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated last year
- ShadowDigger: A Python CLI tool for SQLite DB management and doxing. It allows data creation, insertion, and querying, catering to doxing…☆10Jul 9, 2023Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Sample Rust Hooking Engine☆34Apr 5, 2024Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆63Mar 15, 2026Updated last month
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆16Jun 4, 2025Updated 11 months ago
- ☆22Jan 28, 2026Updated 3 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- A fully server-side authentication system using NestJS and JWT. This implementation automates access and refresh token handling—no need f…☆13Aug 2, 2025Updated 9 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆498Feb 13, 2023Updated 3 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆25Mar 15, 2026Updated last month
- ☆55Oct 13, 2025Updated 6 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆104Apr 11, 2025Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆95Nov 13, 2025Updated 5 months ago
- A flutter based app for scanning credit cards. Built on (https://github.com/devnied/EMV-NFC-Paycard-Enrollment)☆12Oct 7, 2023Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- ☆19Sep 18, 2023Updated 2 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 3 years ago
- ☆41Feb 20, 2025Updated last year
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A very very very simple tool to compile folder to fake ps4/ps5 pkg☆16Dec 3, 2023Updated 2 years ago
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆39Feb 4, 2026Updated 3 months ago
- Everything from my OSEP study.☆192Jan 4, 2026Updated 4 months ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 3 years ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- Code example for React with OAuth Implicit grant authentication and example DocuSign eSignature API calls.☆16Dec 4, 2023Updated 2 years ago
- ☆15Apr 9, 2026Updated 3 weeks ago