a subdomain enumeration tool with lots of pep
☆25Aug 18, 2025Updated 7 months ago
Alternatives and similar repositories for snrublist3r
Users that are interested in snrublist3r are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆33Jan 22, 2026Updated 2 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 3 months ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- Tool to list, view and extract files from ggpack data files used by the Thimbleweed Park game☆11Oct 27, 2018Updated 7 years ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 3 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆46Dec 30, 2025Updated 3 months ago
- Scrape GrayHat Warefare for leaked code signing certificates. Outputs certificate hashes to crack with JtR☆12Nov 25, 2023Updated 2 years ago
- IDA processor module for Renesas RX63 MCU☆14Nov 10, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆65Feb 12, 2026Updated last month
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆140Jul 2, 2025Updated 8 months ago
- OWASP Foundation Web Respository☆20Dec 8, 2023Updated 2 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- Hacks For Subdomain Enumeration☆34Jun 7, 2022Updated 3 years ago
- Research on the Gallagher / Cardax access control system☆67Jan 9, 2020Updated 6 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆174Sep 3, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MetropolJS: Visualizing and Debugging Large-Scale JavaScript Program Structure with Treemaps☆16Oct 27, 2023Updated 2 years ago
- ☆30Oct 13, 2020Updated 5 years ago
- PowerShell module for configuring and managing Microsoft Always On VPN.☆20Mar 16, 2026Updated 2 weeks ago
- ☆10Mar 20, 2024Updated 2 years ago
- Some stuff about telecom security☆15Feb 21, 2016Updated 10 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Feb 24, 2022Updated 4 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated 2 weeks ago
- ☆18Oct 4, 2020Updated 5 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆18Jan 16, 2024Updated 2 years ago
- Bot to create MISP events from data in Slack☆17Jan 10, 2024Updated 2 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Aug 19, 2020Updated 5 years ago
- Convert CIDR blocks to constituent IP addresses☆48Aug 19, 2022Updated 3 years ago
- ☆59May 8, 2024Updated last year
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- ☆20Oct 26, 2022Updated 3 years ago