a subdomain enumeration tool with lots of pep
☆24Aug 18, 2025Updated 6 months ago
Alternatives and similar repositories for snrublist3r
Users that are interested in snrublist3r are comparing it to the libraries listed below
Sorting:
- Common User Password Profiler☆13Aug 20, 2025Updated 6 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 2 months ago
- Tool to list, view and extract files from ggpack data files used by the Thimbleweed Park game☆11Oct 27, 2018Updated 7 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- ☆28Jan 17, 2026Updated last month
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- ☆10Mar 20, 2024Updated last year
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Feb 1, 2019Updated 7 years ago
- Updated GNU Screen 4.5.0 Exploit: This repository hosts an enhanced exploit for GNU Screen 4.5.0, optimized for Kali Linux 2024. It inclu…☆17Jun 10, 2024Updated last year
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- Scrape GrayHat Warefare for leaked code signing certificates. Outputs certificate hashes to crack with JtR☆12Nov 25, 2023Updated 2 years ago
- A lightweight text editor written in LuaJIT (Custom version of rxi/lite)☆12Aug 31, 2025Updated 6 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆17Jun 12, 2023Updated 2 years ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- Some stuff about telecom security☆15Feb 21, 2016Updated 10 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆42Dec 30, 2025Updated 2 months ago
- ☆55Feb 12, 2026Updated 3 weeks ago
- IDA processor module for Renesas RX63 MCU☆14Nov 10, 2025Updated 3 months ago
- Research on the Gallagher / Cardax access control system☆67Jan 9, 2020Updated 6 years ago
- Free googleTranslate Translation tool package for Golang☆16Dec 4, 2014Updated 11 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- ☆17Sep 8, 2017Updated 8 years ago
- ☆24Feb 21, 2025Updated last year
- Use Line6 FBV to control different amps, especially the Kemper Profiling Amplifier☆16Oct 7, 2020Updated 5 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- ☆18Oct 4, 2020Updated 5 years ago
- MetropolJS: Visualizing and Debugging Large-Scale JavaScript Program Structure with Treemaps☆16Oct 27, 2023Updated 2 years ago
- Phone bluetooth suite that can track and prompt user notification☆17May 30, 2024Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆138Jul 2, 2025Updated 8 months ago
- ☆20Oct 26, 2022Updated 3 years ago
- Suite of radare2 plugins to read and manipulate the ggpack data files used by Thimbleweed Park game☆21Oct 23, 2022Updated 3 years ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆171Sep 3, 2025Updated 6 months ago
- Check if IP address is part of AWS infrastructure☆18Dec 2, 2020Updated 5 years ago
- ☆21Sep 10, 2021Updated 4 years ago
- A SKILL.md for ipsw☆43Jan 27, 2026Updated last month
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year