Qemuno Framework
☆24Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for Qemuno
Users that are interested in Qemuno are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fire-AV is a collection of lists that you can use to block av providers and bad ips☆23Updated this week
- ☆14Mar 9, 2023Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- Notes Template/Checklist for PEN-300 OSEP☆17Nov 20, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This cheatsheet maps common impacket workflows to their modern alternatives☆222Apr 21, 2026Updated 2 weeks ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆34Oct 22, 2024Updated last year
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- ☆57Aug 19, 2024Updated last year
- ☆26Feb 11, 2025Updated last year
- Bloomberg Cloud Storage Chef application☆16Aug 24, 2017Updated 8 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- ☆23Oct 9, 2024Updated last year
- VNC server application for iOS Simulators running on mac machines☆16Jul 18, 2014Updated 11 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆75Mar 19, 2025Updated last year
- DLL injection with Microsoft detours☆23Dec 9, 2025Updated 4 months ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Example osquery configuration for Linux servers using eBPF for events☆17Aug 27, 2021Updated 4 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆39Jan 2, 2025Updated last year
- a python code runner for Quartz static site generator☆11Aug 15, 2025Updated 8 months ago
- Scanner which is capable of scanning multiple hosts or multiple subnets on an SSL port and output a CSV file with the certificate details…☆14Nov 29, 2013Updated 12 years ago
- abusing windows toast notifications for fun and user manipulation☆100Mar 20, 2026Updated last month
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Github mirror of MediaWiki extension MsUpload - our actual code is hosted with Gerrit (please see https://www.mediawiki.org/wiki/Develop…☆12Apr 28, 2026Updated last week
- Trac on an Ubuntu-based Docker Image☆11Jun 14, 2018Updated 7 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 3 months ago
- ☆40Nov 25, 2025Updated 5 months ago
- ☆15Nov 2, 2022Updated 3 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hack to get the iPhone Simulator to run on the command line☆19Jun 25, 2010Updated 15 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- ☆194Nov 21, 2024Updated last year