☆13Nov 24, 2019Updated 6 years ago
Alternatives and similar repositories for peasant
Users that are interested in peasant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Apr 30, 2026Updated 3 weeks ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 10 months ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- Scrape, Hunt, and Transform names and usernames☆128Nov 19, 2022Updated 3 years ago
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- A bot that'll monitor the number of followers of its followers and tweet when the counter gets to interesting values.☆13Jun 10, 2018Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated 2 months ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- A TCP service multiplexer☆19May 4, 2017Updated 9 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 5 years ago
- Design and implementation of a miniature oscilloscope module with a usb interface.☆12Jan 26, 2019Updated 7 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A simple example on how to initiate a direct syscall on WoW64☆11Feb 2, 2018Updated 8 years ago
- A simple static site generator with an integrated toolchain for efficient development and delivery.☆20Sep 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Simple USB Desktop Locker☆11Nov 21, 2021Updated 4 years ago
- Bhola tells it's overseer on when the certificates tracked by bhola are about to expire☆13Oct 3, 2020Updated 5 years ago
- Golang script to bypass the client-side health checks when logging into DUO protected accounts☆11Aug 26, 2023Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- ☆27Feb 3, 2026Updated 3 months ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆56Jan 24, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- The code repository for the dSploit project update server.☆14Jun 17, 2014Updated 11 years ago
- ☆14Jun 2, 2025Updated 11 months ago
- Open source SDR LTE software suite☆19Jan 11, 2018Updated 8 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago