WordPress version identification and vulnerability finder.
☆31Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for vane2
Users that are interested in vane2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆88Jan 11, 2024Updated 2 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- ☆117Jun 2, 2021Updated 4 years ago
- AI-based, context-driven network device ranking☆300Feb 1, 2024Updated 2 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated 2 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- 🧿Join your two exe files☆12Jul 14, 2020Updated 5 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated last year
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆62Feb 27, 2026Updated 3 weeks ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- Daily C2 threat intelligence feed☆19Updated this week
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆17Apr 14, 2022Updated 3 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- A bridge to launch managed applications (.NET) into MS signed exe via dll injection☆13Aug 29, 2020Updated 5 years ago
- Built for brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, S…☆12Dec 26, 2024Updated last year
- ☆21Apr 16, 2023Updated 2 years ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- 🌃 Start and control a Tor instance.☆12Apr 9, 2022Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆284Nov 28, 2022Updated 3 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- Azure PowerShell Scripts for Compute, Virtual Machines, Networking, Storage, Disks and Resource Groups.☆16Sep 24, 2024Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- ☆16Jan 12, 2022Updated 4 years ago