☆12Apr 5, 2025Updated 11 months ago
Alternatives and similar repositories for Attacker_Infrastructure_Setup
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- 小米空调伴侣杂项功能,包含收音机控制、铃声控制以及作为TTS使用,同样适用于小米网关☆23Nov 19, 2020Updated 5 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- ☆15Aug 21, 2021Updated 4 years ago
- ☆34Mar 17, 2026Updated last week
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- OMÜ Bilgisayar Mühendisliği - Sistem Programlama Dersi - Soket Programlama Konu Anlatımı☆13Jan 8, 2021Updated 5 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- My imagination of the i3 theme for Endeavour OS, heavily inspiring from the default Xfce theme in EOS. This is an UNOFFICIAL theme.☆10May 5, 2020Updated 5 years ago
- AES Encryption using x86 Assembly (NASM)☆15Jun 15, 2020Updated 5 years ago
- personal reimplementation of softsplatting☆26Jul 19, 2021Updated 4 years ago
- MCP wrapper for Hashcat – automate hash cracking with natural language☆24Jun 5, 2025Updated 9 months ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- ☆12Oct 10, 2024Updated last year
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A simple C program acting as Keylogger.☆18Apr 15, 2018Updated 7 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 5 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- CLI script to use GadgetProbe as a library to generate serialized payloads of DNS callbacks to free DNSbin to probe what Java classpaths …☆14Jun 8, 2021Updated 4 years ago
- aplikasi surat menyurat☆11Jan 3, 2023Updated 3 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Example of Zip Slip vulnerability exploitation☆19Feb 22, 2026Updated last month
- A wrapper library for the set of ptrace-related system calls in Linux☆13May 20, 2014Updated 11 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- Codeigniter 4 CRUD Generator☆15Sep 29, 2021Updated 4 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated last month
- ☆40Aug 27, 2025Updated 6 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆33Oct 22, 2024Updated last year
- ☆25Apr 26, 2018Updated 7 years ago
- Simple script for deface☆19Apr 26, 2018Updated 7 years ago
- Deploy Vulnerable Lab to Learn Pentest using Bash Script☆18May 2, 2023Updated 2 years ago
- ☆15Feb 5, 2025Updated last year
- Kumpulan command yang dijalankan setiap chapter materi pelatihan Wazuh.☆15Oct 1, 2023Updated 2 years ago
- Laravel Form Field the extension of Laravelcollective Form☆16Dec 10, 2024Updated last year
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago