Hacking resources for the Exegol project
☆43Mar 7, 2026Updated 2 weeks ago
Alternatives and similar repositories for Exegol-resources
Users that are interested in Exegol-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker images of the Exegol project☆131Mar 13, 2026Updated last week
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆145Nov 20, 2025Updated 4 months ago
- Fully featured and community-driven hacking environment☆2,960Updated this week
- This project is aimed at freely providing technical guides on various hacking tools.☆122Feb 28, 2026Updated 3 weeks ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project is aimed at freely providing technical guides on various hacking topics.☆1,043Mar 7, 2026Updated 2 weeks ago
- API for bulk_extractor version 1.3☆14Nov 6, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆78Aug 19, 2024Updated last year
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 9 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆13Aug 19, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, res…☆20Nov 16, 2023Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆17Sep 30, 2025Updated 5 months ago
- This reconissance tool is specific written for OSCP engagements.☆55May 22, 2023Updated 2 years ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- ☆56Apr 17, 2025Updated 11 months ago
- Command line client for HackTheBox☆25Feb 26, 2024Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆390Feb 27, 2026Updated 3 weeks ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆131Oct 10, 2021Updated 4 years ago
- A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center.☆22Jan 23, 2024Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Jul 12, 2023Updated 2 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆386Oct 27, 2024Updated last year
- ☆98Jun 22, 2025Updated 9 months ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- A list of weird comparison in SQL☆15May 20, 2022Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- ForsHops☆59Mar 25, 2025Updated last year
- ☆14Dec 5, 2024Updated last year