Kali configuration optimized for red teaming/pentesting/CTFs
☆21Oct 20, 2023Updated 2 years ago
Alternatives and similar repositories for linuxconfig
Users that are interested in linuxconfig are comparing it to the libraries listed below
Sorting:
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Jun 4, 2019Updated 6 years ago
- Windows Filtering Platform Driver for Outbound TCP Traffic Inspection and Filtering☆9Feb 11, 2024Updated 2 years ago
- ☆15Jul 10, 2025Updated 8 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 9 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Python based Docker for Eagle to MQTT reader☆14Jun 3, 2022Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- xilinx_cfg☆20Jul 8, 2024Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- Gatekeeper: Long Range RFID Stealing and Cloning☆19Apr 16, 2024Updated last year
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Some scripts to support with importing large datasets into BloodHound☆81Nov 28, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆74Mar 1, 2024Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- ☆11Aug 11, 2014Updated 11 years ago