byt3bl33d3r / tmux-configView external linksLinks
Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment
☆14Dec 24, 2019Updated 6 years ago
Alternatives and similar repositories for tmux-config
Users that are interested in tmux-config are comparing it to the libraries listed below
Sorting:
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆56Mar 26, 2019Updated 6 years ago
- ☆15Feb 22, 2021Updated 4 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- A collection of awesome readme templates to display on your profile☆20Jul 25, 2020Updated 5 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆26Apr 10, 2025Updated 10 months ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A hacking tool for brute forcing WiFi password☆30Aug 2, 2025Updated 6 months ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Modern problems require modern solutions☆32Nov 22, 2022Updated 3 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Well, I have created this shit for educational pruposes (I think)☆38Jul 24, 2022Updated 3 years ago
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- Remove the Telegram deleted account members from your destination group☆10Oct 14, 2025Updated 4 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago