RedsTom / PrivateRoomsView external linksLinks
A bot to create private rooms
☆15Dec 17, 2023Updated 2 years ago
Alternatives and similar repositories for PrivateRooms
Users that are interested in PrivateRooms are comparing it to the libraries listed below
Sorting:
- ☆10Jul 15, 2020Updated 5 years ago
- ☆14Sep 1, 2024Updated last year
- ☆22Updated this week
- Grafana Dashboard for Veeam Backup & Replication REST API☆13Feb 4, 2025Updated last year
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆12Jun 16, 2022Updated 3 years ago
- The win-loss Counter for Overwatch Stream.☆12Aug 8, 2023Updated 2 years ago
- A powerful and secure wrapper for interacting with the Discord API.☆12Jul 26, 2021Updated 4 years ago
- A fast and flexible update system.☆12Dec 29, 2020Updated 5 years ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- ☆27Jul 2, 2024Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆37Jan 3, 2026Updated last month
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Jul 2, 2025Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Apr 7, 2025Updated 10 months ago
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- SNMPv3 Authentication Bruteforcer☆38Aug 12, 2021Updated 4 years ago
- Tool for automate bug hunting process 🔍 --> 🍭☆47Jun 27, 2025Updated 7 months ago
- [Automated | UpToDate] Daily Dumps of CertStream Certificate Logs Subdomains Data (SAN || CN)☆49Mar 6, 2025Updated 11 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- Useful tool to track location or mobile number.☆71Sep 16, 2025Updated 5 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Feb 12, 2025Updated last year
- Proxmox VE control CLI☆71Jul 9, 2025Updated 7 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆57Jan 8, 2024Updated 2 years ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆112Jan 15, 2026Updated last month
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Payload for jpg file☆61Aug 17, 2024Updated last year
- Obfuscate the bytes of your payload with an association dictionary☆75Nov 7, 2025Updated 3 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Nov 18, 2024Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆95Jan 16, 2026Updated last month
- A spy pixel which can be emedded into web pages or emails.☆108Aug 16, 2024Updated last year
- Tool for creating reports on Entra ID Role Assignments☆101Apr 12, 2024Updated last year
- Payload for bug bounty☆98Jul 7, 2024Updated last year
- ☆110Feb 13, 2024Updated 2 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Sep 4, 2025Updated 5 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated 10 months ago