Hacking resources for the Exegol project
☆42Feb 1, 2026Updated last month
Alternatives and similar repositories for Exegol-resources
Users that are interested in Exegol-resources are comparing it to the libraries listed below
Sorting:
- Docker images of the Exegol project☆130Updated this week
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆145Nov 20, 2025Updated 3 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- Beautify Nessus scan output☆12Dec 2, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- API for bulk_extractor version 1.3☆14Nov 6, 2025Updated 3 months ago
- ☆14Mar 6, 2025Updated 11 months ago
- This project is aimed at freely providing technical guides on various hacking topics.☆1,029Updated this week
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Fully featured and community-driven hacking environment☆2,938Updated this week
- This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, res…☆19Nov 16, 2023Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆120Updated this week
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- A simple PoC crypto ransomware in Python☆19Jul 31, 2016Updated 9 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆130Oct 10, 2021Updated 4 years ago
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- ☆56Apr 17, 2025Updated 10 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Labs setup for tests & experimentations☆25Aug 30, 2021Updated 4 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆388Updated this week
- This reconissance tool is specific written for OSCP engagements.☆55May 22, 2023Updated 2 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 2 months ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- USB Scanning device☆32Sep 16, 2025Updated 5 months ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year