Python passive host discovery script
☆11Mar 30, 2025Updated 11 months ago
Alternatives and similar repositories for babble
Users that are interested in babble are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compile SharpHound and others on Linux☆24Aug 16, 2024Updated last year
- Automatically run and populate a new instance of BH CE☆120Jan 30, 2026Updated last month
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- Plateforme d’apprentissage pour s'initier à la Cybersécurité / Pentest / Sécurité des systèmes d'informations☆10Jun 6, 2022Updated 3 years ago
- Bitpixie exploitation PoC☆98Oct 28, 2025Updated 4 months ago
- Code for Sergeev et al. (2020)☆14Apr 15, 2023Updated 2 years ago
- RPC to WebClient startup☆57Aug 19, 2025Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Embed and obfuscate data in Portable Network Graphics☆14Feb 8, 2026Updated last month
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated last month
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- ☆31Dec 5, 2024Updated last year
- ☆23Mar 2, 2026Updated 3 weeks ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Challenges of the HeroCTF v3 edition.☆24Apr 28, 2021Updated 4 years ago
- A safe place to hide all your precious data at.☆25Feb 27, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,495Updated this week
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- This lab will show you how to use Vagrant, VirtualBox, and Docker to automate the creations of development environments☆27May 1, 2023Updated 2 years ago
- This is a command line tool I use when I want to get notified, on Telegram (on my phone), that something has finished running (on my lapt…☆61Jul 8, 2020Updated 5 years ago
- C# Process Hollowing POC☆18Jan 5, 2023Updated 3 years ago
- ☆16Jul 20, 2025Updated 8 months ago
- Inject unsigned DLL into Protected Process Light (PPL)☆41May 8, 2025Updated 10 months ago
- ☆12Sep 14, 2022Updated 3 years ago
- A Windows disk dumper☆24Nov 12, 2015Updated 10 years ago
- DFIR project to collect and analyze events in Google Workspace☆13Apr 12, 2024Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- coldboot-tools☆33May 12, 2020Updated 5 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 9 months ago