☆14May 23, 2018Updated 7 years ago
Alternatives and similar repositories for THP1-2_Updates
Users that are interested in THP1-2_Updates are comparing it to the libraries listed below
Sorting:
- ☆209Sep 15, 2018Updated 7 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Understand your Zotero library☆15Dec 25, 2025Updated 2 months ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Filter out crap stories from hackernews/news.ycombinator.com☆14Jan 1, 2026Updated 2 months ago
- ☆16Sep 11, 2025Updated 6 months ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- thp2 setup☆265Aug 25, 2019Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Quickly protect your self-hosted TCP applications with mTLS via an easy-to-use interface and client application☆13Jun 11, 2025Updated 9 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Open-source web & API security training platform with curated, modular labs and progress tracking.☆41Mar 12, 2026Updated last week
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- ☆42Apr 20, 2018Updated 7 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- ☆262Sep 6, 2017Updated 8 years ago
- emacs snippet (yasnippets) for golang☆21Jul 1, 2015Updated 10 years ago
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Exploit for CVE-2022–25765 (pdfkit) - Command Injection☆27Sep 12, 2025Updated 6 months ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Vintage map style for Mapbox Studio (GL)☆42Apr 10, 2022Updated 3 years ago
- Example RPC service for blog post☆17Jul 13, 2019Updated 6 years ago