Qemuno Framework
☆24Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for Qemuno
Users that are interested in Qemuno are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fire-AV is a collection of lists that you can use to block av providers and bad ips☆21Updated this week
- ☆139Mar 29, 2023Updated 2 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆33Oct 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- ☆26Feb 11, 2025Updated last year
- ☆23Oct 9, 2024Updated last year
- ☆75Mar 19, 2025Updated last year
- DLL injection with Microsoft detours☆22Dec 9, 2025Updated 3 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Scanner which is capable of scanning multiple hosts or multiple subnets on an SSL port and output a CSV file with the certificate details…☆14Nov 29, 2013Updated 12 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆66Jan 13, 2026Updated 2 months ago
- ☆15Nov 2, 2022Updated 3 years ago
- Small program to run requests against a web server and look for problems☆11Jan 20, 2016Updated 10 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Hack to get the iPhone Simulator to run on the command line☆19Jun 25, 2010Updated 15 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- A tool to manipulate NFSv4/ZFS ACLs (and more) on Linux, FreeBSD, Solaris & MacOS☆16Mar 15, 2026Updated last week
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- ☆189Nov 21, 2024Updated last year
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- A tool for RetroPie to convert videos.☆12Jul 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- ☆13Dec 29, 2022Updated 3 years ago
- 🚀 Use Firecracker and helpings of bash to boot Ubuntu virtual machines very fast 🔥☆21Jul 15, 2023Updated 2 years ago
- Query the 'PublicWWW' Source Code Search Engine in R☆13May 2, 2018Updated 7 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year