This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Jul 7, 2021Updated 4 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- My ctf-writeups☆12Jan 28, 2019Updated 7 years ago
- reveal and detect of common hooks under win32☆12Sep 23, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Download raw (free) APKs from Google Play Store☆10Apr 26, 2018Updated 7 years ago
- PHP5 Library for browsing web☆11Jan 13, 2017Updated 9 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Mar 25, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Hook discord's rendering functions without patching .text.☆14Nov 14, 2021Updated 4 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- Patches Steam to download depot files without manifest data.☆19Apr 15, 2020Updated 5 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆16May 15, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Deobfuscator for RustemSoft Skater.Net Obfuscator☆15Apr 26, 2020Updated 5 years ago
- A set of scripts to facilitate HTTP interception on mobile apps☆22Mar 11, 2026Updated 3 weeks ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 9 months ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Understanding some of the Anti-Reversing Techniques☆11Oct 6, 2019Updated 6 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/ntest☆12Jun 13, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Adaptive eXocortex & Integrated Outer Memory Framework☆34Mar 15, 2020Updated 6 years ago
- GDB cheatsheet for reversing binaries☆21Jan 25, 2019Updated 7 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 3 months ago