Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs
☆13Mar 10, 2021Updated 5 years ago
Alternatives and similar repositories for pwner
Users that are interested in pwner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- Course files for Google Cloud Professional Cloud Security Engineer - Antoni Tzavelas☆19Mar 27, 2022Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Social Media Web app - MERN☆14Nov 28, 2022Updated 3 years ago
- Weekly updated MaxMind Free databases available through releases.☆25Dec 6, 2024Updated last year
- Writeup for the challenges in Really Awesome CTF 2020☆13Aug 3, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Nov 20, 2021Updated 4 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Ionic 4 News Application☆19Feb 2, 2023Updated 3 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Jan 15, 2024Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Example Spring application used and deployed to AWS Elastic Beanstalk during the Cloud Workshop at VIA University☆21Nov 16, 2022Updated 3 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆10Dec 26, 2022Updated 3 years ago
- Express Backend for a social media react native app (Messaging, Posts, Followers, Discover, Auth, And More)☆32Jun 19, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Audit log wall of shame.☆42Aug 20, 2025Updated 7 months ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- A fun POC that is built to understand AI security agents.☆34Oct 30, 2025Updated 4 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- [Under Development] This is a modification to the Ubertooth One firmware developed by Great Scott Gadgets. The modified firmware is able …☆22Feb 22, 2022Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆55Mar 20, 2026Updated last week
- ☆11Oct 3, 2021Updated 4 years ago
- ☆15May 9, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Mar 6, 2019Updated 7 years ago
- A lightweight command sandbox for Linux, secure-by-default, built on Landlock.☆64Mar 19, 2026Updated last week
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Advanced Blue Team Security Analysis Framework powered by Multiple AI Models☆48Dec 23, 2025Updated 3 months ago
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated last year