SygniaLabs / QemunoView external linksLinks
Qemuno Framework
☆24Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for Qemuno
Users that are interested in Qemuno are comparing it to the libraries listed below
Sorting:
- ☆14Mar 9, 2023Updated 2 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆23Oct 9, 2024Updated last year
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 3 years ago
- ☆26Jul 11, 2022Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆38Dec 22, 2025Updated last month
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- A CALDERA plugin☆80Feb 6, 2026Updated last week
- Scripts and things.☆13Jan 23, 2026Updated 3 weeks ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆40Mar 25, 2024Updated last year
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆90Feb 2, 2026Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Updated this week
- ☆41Jan 10, 2020Updated 6 years ago
- A semi print-in-place hand for human-like manipulation, designed to be built by anyone.☆17Jan 5, 2026Updated last month
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 3 months ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- ☆10Mar 4, 2019Updated 6 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- ☆39Jun 28, 2019Updated 6 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Mar 16, 2023Updated 2 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆40Aug 29, 2023Updated 2 years ago
- An opinionated way to deploy a Kubernetes cluster on top of an OpenStack cloud.☆13Aug 9, 2018Updated 7 years ago
- Find out cryptocurrency arbitrage opportunities across exchanges. (No Fiat withdrawal involved)☆11Jan 30, 2018Updated 8 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year