This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Jul 7, 2021Updated 4 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below
Sorting:
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- reveal and detect of common hooks under win32☆13Sep 23, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last week
- Simple libpcap usage example☆11Jul 9, 2024Updated last year
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Exploiting CVE-2016-2334 7zip HFS+ vulnerability☆10Nov 29, 2017Updated 8 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Google Workspace password sprayer with anti-captcha☆14Mar 11, 2026Updated last week
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Jun 26, 2024Updated last year
- Hook discord's rendering functions without patching .text.☆14Nov 14, 2021Updated 4 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 5 years ago
- MagicPoints plugin for x64dbg☆20Jan 19, 2018Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆12Apr 21, 2019Updated 6 years ago
- Patches Steam to download depot files without manifest data.☆18Apr 15, 2020Updated 5 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆16May 15, 2021Updated 4 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 8 months ago
- Deobfuscator for RustemSoft Skater.Net Obfuscator☆15Apr 26, 2020Updated 5 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆23Jun 29, 2025Updated 8 months ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Understanding some of the Anti-Reversing Techniques☆11Oct 6, 2019Updated 6 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/ntest☆12Jun 13, 2015Updated 10 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆56Jul 8, 2022Updated 3 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆16Mar 11, 2026Updated last week
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago