GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.
☆11Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for GeoWordlists
Users that are interested in GeoWordlists are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Anonymize your hashcat formatted files for online cracking☆31Oct 27, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- DJI Drone Control Hijacking☆42Sep 13, 2023Updated 2 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Rust crate to simplify Windows ACL operations☆19Jun 9, 2023Updated 2 years ago
- ☆27May 6, 2024Updated last year
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 11 months ago
- This project is aimed at freely providing technical guides on various hacking tools.☆121Feb 28, 2026Updated 3 weeks ago
- ☆14Dec 5, 2024Updated last year
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- PowerShell script to create reports of M365 User Multi-factor Authentication Registration Status and Highlight MFA Related Conditional Ac…☆14May 17, 2024Updated last year
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago