☆12Nov 22, 2016Updated 9 years ago
Alternatives and similar repositories for Powershell-Domain-User-Enumeration
Users that are interested in Powershell-Domain-User-Enumeration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Command-line tool that interacts with Palo Alto firewalls and Panorama☆19Mar 11, 2026Updated last week
- LET ME SLASH THE PINEAPPLE FOR FUN☆29Dec 23, 2015Updated 10 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- hostapd-mana - build-files, and installation-files for OpenWRT☆33Nov 20, 2021Updated 4 years ago
- $10 USB Rubber Ducky Clone☆64Sep 15, 2017Updated 8 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- A toolkit for the USB Rubber ducky. Featuring an emulator, code validator & encoder.☆51Jan 19, 2017Updated 9 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- Discover USB device history for a specific user☆23Dec 28, 2015Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- ☆14May 20, 2020Updated 5 years ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆42Jul 30, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- Cerbos Rust SDK☆14Updated this week
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- ☆26May 7, 2016Updated 9 years ago
- first commit☆23Feb 16, 2026Updated last month
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- USB Rubber Ducky for ATTiny85☆117Oct 1, 2020Updated 5 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Jul 19, 2018Updated 7 years ago
- ☆18Jan 8, 2021Updated 5 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago