Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
☆28Mar 2, 2019Updated 7 years ago
Alternatives and similar repositories for ctfr
Users that are interested in ctfr are comparing it to the libraries listed below
Sorting:
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Jan 18, 2019Updated 7 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- A terraform module providing an opinionated Consul cluster built on an ECS cluster in AWS.☆15Mar 12, 2020Updated 5 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Jul 30, 2019Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- Lint your Rego policies inside of Visual Studio Code☆16Jun 16, 2024Updated last year
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- ☆25Sep 5, 2017Updated 8 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 7 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Utils for Cryptography class (1047622)☆14Nov 13, 2025Updated 3 months ago
- ☆11Aug 25, 2018Updated 7 years ago
- Kubernetes on AWS Workshop☆10Nov 3, 2017Updated 8 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Code for reproducing the results from "CrAM: A Compression-Aware Minimizer" accepted at ICLR 2023☆10Mar 1, 2023Updated 3 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Bayesian adaptive stimulus placement of psychometric function for MATLAB.☆10Nov 7, 2018Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- A nonparametric variational information bottleneck (NVIB) layer in Pytorch☆11Apr 15, 2025Updated 10 months ago
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- Tensegrity Lab is for efficiently exploring spatial structures based on pure pairwise push and pull forces using Rust Language☆11Updated this week
- Face2Faceの実装とか☆13Jun 11, 2016Updated 9 years ago
- A script to copy/backup the backup files from a Proxmox server to an external harddrive and a tape device☆10Apr 30, 2025Updated 10 months ago
- Code for the paper 'Monte Carlo Tree Search for Asymmetric Trees'☆12May 24, 2018Updated 7 years ago