☆39Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for attacktive-directory-tools
Users that are interested in attacktive-directory-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jul 1, 2023Updated 2 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- ☆26Jan 27, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- Reading and resources lists on a variety of technical topics.☆42Oct 29, 2020Updated 5 years ago
- ☆28Mar 25, 2021Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Intentionaly very vulnerable API with bonus bad coding practices☆51Nov 15, 2025Updated 4 months ago
- My Leetcode Problems' Solutions☆11Sep 7, 2023Updated 2 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 4 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- ☆24Mar 2, 2026Updated 3 weeks ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- base Bot Queries Discord Made to use API'S CPF, TEL ,CEP, etc...☆11Feb 27, 2023Updated 3 years ago
- Practical Web Penetration Testing, published by Packt☆25Jan 30, 2023Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆10Aug 13, 2018Updated 7 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- OSCP Preperation