Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live
☆24Dec 4, 2018Updated 7 years ago
Alternatives and similar repositories for Material
Users that are interested in Material are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆25Jun 17, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 12 years ago
- Cfm Shell v3.0 edition☆13Jun 16, 2013Updated 12 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆56Feb 11, 2019Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Arduino sketch that helps you configure your HC-06 bluetooth module.☆12Jan 10, 2017Updated 9 years ago
- xdebug reverse shell☆23Jan 18, 2018Updated 8 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- JWT Debugger extension based on JWT.io☆12Nov 21, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Apr 25, 2024Updated 2 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Detect snooper on your system!☆84Feb 6, 2017Updated 9 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 10 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- It's an RSA-cracker, that uses Fermat's factorization method to get p and q.☆15Dec 19, 2015Updated 10 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- Here will be a rom and kernel downloads☆11Sep 10, 2020Updated 5 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 5 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Mar 18, 2009Updated 17 years ago