GitLab User Enumeration
☆61Jan 3, 2025Updated last year
Alternatives and similar repositories for GitLabUserEnum
Users that are interested in GitLabUserEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script will bruteforce the credential of tomcat manager or host-manager☆35Jun 24, 2020Updated 5 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆139Aug 20, 2018Updated 7 years ago
- Joomla login bruteforce☆115Jul 18, 2024Updated last year
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆27Feb 27, 2023Updated 3 years ago
- ☆199Jan 12, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆166Jun 14, 2018Updated 7 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆37May 1, 2018Updated 8 years ago
- Python script to decrypt passwords stored by mRemoteNG☆179Jul 6, 2023Updated 2 years ago
- C# implementation of harmj0y's PowerView☆49Mar 22, 2020Updated 6 years ago
- Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)☆26Sep 4, 2021Updated 4 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆234Feb 20, 2020Updated 6 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆86Feb 21, 2019Updated 7 years ago
- Loads a custom dll in system32 via diaghub.☆88Mar 16, 2020Updated 6 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆357Oct 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- linikatz is a tool to attack AD on UNIX☆597Oct 19, 2023Updated 2 years ago
- getsystem via parent process using ps1 & embeded c#☆481Oct 26, 2023Updated 2 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆444Jul 29, 2013Updated 12 years ago
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,413Jun 27, 2024Updated last year
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user☆995Jan 29, 2023Updated 3 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆335Sep 18, 2022Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆156Apr 20, 2022Updated 4 years ago
- A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.☆710May 20, 2023Updated 2 years ago
- A super small jsp webshell with file upload capabilities.☆329Aug 20, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Extracts Key Values from .keytab files☆357Aug 26, 2020Updated 5 years ago
- Code, exploits, and tips for pentesting osTicket☆13Feb 28, 2025Updated last year
- Windows AV Evasion☆846Apr 13, 2020Updated 6 years ago
- ☆116Dec 13, 2019Updated 6 years ago
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,669Jan 15, 2024Updated 2 years ago
- Exploit allowing you to read registry hives as non-admin on Windows 10 and 11☆822Jul 26, 2021Updated 4 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,313Feb 16, 2026Updated 2 months ago
- Proof of Concept: HTTP/2 CONTINUATION Flood☆10Apr 7, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆169Sep 18, 2025Updated 7 months ago
- Username tools for penetration testing☆1,374Sep 20, 2024Updated last year
- ☆299Jan 7, 2015Updated 11 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,321Nov 22, 2022Updated 3 years ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,802Feb 27, 2026Updated 2 months ago
- WhiteWinterWolf's PHP web shell☆773Dec 2, 2017Updated 8 years ago
- Python script to enumerate users, groups and computers from a Windows domain through LDAP queries☆959Apr 20, 2022Updated 4 years ago