☆28Jun 12, 2017Updated 8 years ago
Alternatives and similar repositories for PiKey
Users that are interested in PiKey are comparing it to the libraries listed below
Sorting:
- ☆537Feb 19, 2026Updated last week
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 6 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 7 months ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- ☆25Nov 18, 2016Updated 9 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Wordlists for Wfuzz or Dirbuster☆26Feb 19, 2016Updated 10 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Jun 6, 2023Updated 2 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- Enumerates users based off RDP Screenshots☆36Oct 25, 2023Updated 2 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- This repository contains code which allows to fetch your activity data from strava☆13Oct 24, 2024Updated last year