Python passive host discovery script
☆11Mar 30, 2025Updated 11 months ago
Alternatives and similar repositories for babble
Users that are interested in babble are comparing it to the libraries listed below
Sorting:
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- Automatically run and populate a new instance of BH CE☆115Jan 30, 2026Updated last month
- Plateforme d’apprentissage pour s'initier à la Cybersécurité / Pentest / Sécurité des systèmes d'informations☆10Jun 6, 2022Updated 3 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- C# Process Hollowing POC☆18Jan 5, 2023Updated 3 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆12Sep 14, 2022Updated 3 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Code for Sergeev et al. (2020)☆14Apr 15, 2023Updated 2 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated last month
- Public Landing Page☆16Jan 7, 2023Updated 3 years ago
- ☆20Feb 24, 2026Updated last week
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- ☆16Jul 20, 2025Updated 7 months ago
- Bitpixie exploitation PoC☆96Oct 28, 2025Updated 4 months ago
- Embed and obfuscate data in Portable Network Graphics☆14Feb 8, 2026Updated 3 weeks ago
- This is a command line tool I use when I want to get notified, on Telegram (on my phone), that something has finished running (on my lapt…☆61Jul 8, 2020Updated 5 years ago
- DFIR project to collect and analyze events in Google Workspace☆13Apr 12, 2024Updated last year
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- A better netcat for Hackers☆33Dec 1, 2025Updated 3 months ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- A Windows disk dumper☆23Nov 12, 2015Updated 10 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Challenges of the HeroCTF v3 edition.☆24Apr 28, 2021Updated 4 years ago
- ☆24Dec 16, 2020Updated 5 years ago
- OSINT username checker☆48Jun 14, 2025Updated 8 months ago
- A safe place to hide all your precious data at.☆25Feb 27, 2025Updated last year