Qemuno Framework
☆24Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for Qemuno
Users that are interested in Qemuno are comparing it to the libraries listed below
Sorting:
- ☆10Nov 21, 2023Updated 2 years ago
- ☆14Mar 9, 2023Updated 2 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆23Oct 9, 2024Updated last year
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- ☆25Jul 11, 2022Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Dec 13, 2025Updated 2 months ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆40Feb 19, 2026Updated 2 weeks ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- A CALDERA plugin☆81Feb 17, 2026Updated 2 weeks ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- ☆39Feb 11, 2026Updated 3 weeks ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Terraform Examples☆15Jul 19, 2017Updated 8 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆13Mar 3, 2015Updated 11 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection☆10Apr 12, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- A semi print-in-place hand for human-like manipulation, designed to be built by anyone.☆17Jan 5, 2026Updated 2 months ago
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 2 years ago
- Method for storing and unsealing Hashicorp Vault using Ansible and Mac Keychain☆14Nov 29, 2017Updated 8 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- Dependency monitoring web-application☆12Nov 30, 2018Updated 7 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago