dfaram7 / pptshotsLinks
Finding sensitive information in the trimmed parts of cropped images
☆30Updated 3 years ago
Alternatives and similar repositories for pptshots
Users that are interested in pptshots are comparing it to the libraries listed below
Sorting:
- wordlists for password cracking☆28Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Post-exploitation tool☆26Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated 2 years ago
- ☆42Updated 3 months ago
- ☆14Updated 3 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆16Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆20Updated 5 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- visually see issues with supported cipher suites☆16Updated last year
- ☆11Updated 4 years ago
- Left To My Own Devices - NT hash tools☆33Updated 2 years ago
- ☆28Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago