Kali configuration optimized for red teaming/pentesting/CTFs
☆21Oct 20, 2023Updated 2 years ago
Alternatives and similar repositories for linuxconfig
Users that are interested in linuxconfig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- red team tips and trix☆12Jun 27, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows Filtering Platform Driver for Outbound TCP Traffic Inspection and Filtering☆12Feb 11, 2024Updated 2 years ago
- ☆15Jul 10, 2025Updated 8 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Jan 31, 2020Updated 6 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- ☆33Apr 7, 2020Updated 6 years ago
- Python based Docker for Eagle to MQTT reader☆14Jun 3, 2022Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Apr 1, 2026Updated last week
- ☆15Dec 7, 2022Updated 3 years ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 7 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated last year
- xilinx_cfg☆20Jul 8, 2024Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- Gatekeeper: Long Range RFID Stealing and Cloning☆19Apr 16, 2024Updated last year
- Remote memory library in C++17.☆33May 31, 2018Updated 7 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Open-source, enterprise-grade threat modeling platform☆47Updated this week
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Packer is a compact, fast and crosss-platform serialization library for store data in a buffer☆23Aug 5, 2023Updated 2 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Nov 28, 2023Updated 2 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year