d4rckh / im-a-sandboxLinks
make your machine look like a sandbox/vm π€
β29Updated 3 years ago
Alternatives and similar repositories for im-a-sandbox
Users that are interested in im-a-sandbox are comparing it to the libraries listed below
Sorting:
- A lightweight extension to automatically detect and provide verbose warnings for embedded iframe elements in order to protect against Broβ¦β46Updated 2 years ago
- A tool to dump exposed .git repositoriesβ72Updated 3 months ago
- Wordlist to crack .zip-file passwordβ204Updated 3 years ago
- All kinds of tiny shellsβ58Updated 2 years ago
- β27Updated 2 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.β11Updated 11 months ago
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. Theβ¦β16Updated last year
- Nuke It From Orbit - remove AV/EDR with physical accessβ263Updated 9 months ago
- Markov Model libraries, optimized for cracking-focused password generations.β111Updated 4 years ago
- β232Updated 3 years ago
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.β41Updated last year
- A targeted DNS cache poisonerβ121Updated 2 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enoughβ86Updated 4 years ago
- Crappy Golang code to list local listening ports and their associated processes.β32Updated 2 years ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.β110Updated last month
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.β94Updated last month
- β42Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock β¦β205Updated 11 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.β67Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ128Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated last month
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.β29Updated 2 years ago
- Lena's repo of Malware Monsters aka Malmons.β43Updated last month
- Generate graphs and charts based on password cracking resultβ163Updated 2 years ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file hβ¦β86Updated 4 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binaryβ29Updated 3 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.β46Updated 5 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.β153Updated 10 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomaβ¦β84Updated 2 weeks ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptinβ¦β123Updated 8 months ago