Subdomain finder
☆10Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for Lepus
Users that are interested in Lepus are comparing it to the libraries listed below
Sorting:
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- Collection of tools to interact with Intigriti website☆16Aug 10, 2024Updated last year
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 4 years ago
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 5 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Oct 3, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- 通过hosts碰撞发现目标内部系统,扩大攻击面。☆46Aug 11, 2021Updated 4 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Jan 29, 2021Updated 5 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated 11 months ago
- BlockChain Security☆27Jul 14, 2021Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Some CTF Write-ups☆27Feb 7, 2022Updated 4 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆25Mar 4, 2025Updated 11 months ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!☆30Feb 17, 2020Updated 6 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆27Nov 28, 2021Updated 4 years ago
- UNTOUCHED Unity debugging dlls backup from https://github.com/dnSpy/dnSpy-Unity-mono☆38Mar 28, 2023Updated 2 years ago
- jre8u20 gadget☆34May 23, 2021Updated 4 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 9 months ago