A tool to abuse Exchange services
☆18Jun 21, 2019Updated 6 years ago
Alternatives and similar repositories for ruler
Users that are interested in ruler are comparing it to the libraries listed below
Sorting:
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Jul 30, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- A library that scrapes Linkedin for user data☆24May 12, 2021Updated 4 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- thc-ipv6 debian package (part of https://salsa.debian.org/pkg-security-team/thc-ipv6 as of 201607)☆34Aug 3, 2017Updated 8 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Jun 12, 2020Updated 5 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- exploit code for F5-Big-IP (CVE-2020-5902)☆43May 22, 2023Updated 2 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ChessDragon136's Unoficcial MediaBrowser 3 client for Samsung TV's☆10Dec 24, 2015Updated 10 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Research on the various credentials databases that have been dumped.☆11Jan 31, 2018Updated 8 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- ☆11Apr 16, 2016Updated 9 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Tool developed in python for IP address grabbing☆10Nov 30, 2020Updated 5 years ago
- ☆12Sep 14, 2022Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Speakers slides☆12Jan 10, 2018Updated 8 years ago