Example agents for the Dreadnode platform
☆22Dec 19, 2025Updated 2 months ago
Alternatives and similar repositories for example-agents
Users that are interested in example-agents are comparing it to the libraries listed below
Sorting:
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- ☆18Apr 15, 2024Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 3 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 7 months ago
- ☆28Apr 3, 2018Updated 7 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Sep 26, 2011Updated 14 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- A Vim syntax highlighting for YARA and YARA-X rules☆31Jan 1, 2026Updated last month
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- Lightweight LLM Interaction Framework☆407Updated this week
- ☆14Dec 11, 2025Updated 2 months ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- A Burp Suite extension for headless, unattended scanning.☆36Jun 24, 2020Updated 5 years ago
- Intel 64/Windows low-level experiments☆63Aug 25, 2025Updated 6 months ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Feb 16, 2026Updated last week
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 3 weeks ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- ☆13Mar 28, 2024Updated last year
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- This is a backup/test setup for the /r/ActiveDirectory reddit wiki and resource posts.☆19Nov 15, 2025Updated 3 months ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Detecting fake news articles by analyzing patterns in writing.☆10Mar 30, 2020Updated 5 years ago
- A Kubernetes operator for managing Prefect servers and work pools☆17Feb 18, 2026Updated last week
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 9 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year