cburk / dapperView external linksLinks
LDAP Enumeration Tool
☆13Mar 28, 2024Updated last year
Alternatives and similar repositories for dapper
Users that are interested in dapper are comparing it to the libraries listed below
Sorting:
- ☆18Oct 14, 2020Updated 5 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- The ultimate phishing tool with 38 websites available!☆13Nov 7, 2024Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆12Jul 5, 2023Updated 2 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- 目前通过自学已经取得 OSCP(Offensive Security Certified Professional)证书,本项目用于记录、分享、交流。☆11Aug 16, 2022Updated 3 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- A web crawler in PHP☆12Aug 16, 2018Updated 7 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- 用python写的一个自动化解析swagger-api接口并发送的脚本☆11Oct 18, 2022Updated 3 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 10 months ago
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆10May 14, 2023Updated 2 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- 通过通过jhat解析heapdump文件,从而实现heapdump敏感信息搜索。☆10Feb 7, 2023Updated 3 years ago
- ☆13Jun 22, 2020Updated 5 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Weaponized VSCode Extensions☆15Dec 14, 2025Updated last month
- The files for my Solder Sustainer v2 project! Check it out at www.roboticworx.io!☆14Jan 8, 2025Updated last year
- SolarWindsIOCScanner☆11Jan 19, 2021Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- pocsuite☆11Apr 21, 2021Updated 4 years ago
- Sync entire obsidian library to notion database with images included. Minimal user intervention after initial setup, can be run multiple …☆20Jul 21, 2025Updated 6 months ago
- Linux password crack☆14Apr 11, 2022Updated 3 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆14Feb 8, 2023Updated 3 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 8 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago