☆15Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for dotfiles
Users that are interested in dotfiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 5 years ago
- BashBunny Total P0wn System☆18Sep 16, 2017Updated 8 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- Ruby commands for ARIN's Reg-RWS and Whois-RWS☆53Mar 23, 2023Updated 2 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- 🐳 PyLoader: An asynchronous Python dataloader for loading big datasets, supporting PyTorch and TensorFlow 2.x.☆11Aug 29, 2021Updated 4 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- GNU Radio Formulae for Homebrew☆26Aug 1, 2017Updated 8 years ago
- ☆153Jun 30, 2023Updated 2 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆181Dec 25, 2025Updated 2 months ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- This script is written in Perl this is very good admin page finder.☆11Aug 29, 2020Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆14Dec 22, 2020Updated 5 years ago
- A tool Stack to automatically reverse proxy Jellyfin☆34Dec 11, 2022Updated 3 years ago
- Scrape, Hunt, and Transform names and usernames☆128Nov 19, 2022Updated 3 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Helps with finding and registering categorized domains☆70May 6, 2021Updated 4 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- GNU Radio Formulae for Homebrew☆99Aug 2, 2017Updated 8 years ago
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆382Feb 4, 2022Updated 4 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 10 months ago
- strongSwan setup for iOS and OS X☆13Aug 6, 2015Updated 10 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- Extract credentials and other useful info from network captures☆78Nov 3, 2022Updated 3 years ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 8 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆48Feb 28, 2026Updated 3 weeks ago
- Collection of materials related to IBM z/OS security☆45Dec 14, 2015Updated 10 years ago