Lootbox downloads open directories shared on Twitter.
☆35Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for lootbox
Users that are interested in lootbox are comparing it to the libraries listed below
Sorting:
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆10Apr 8, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- ☆19Jan 31, 2025Updated last year
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- A sort of a toolkit to decrypt Dropbox Windows DBX files☆31Apr 30, 2017Updated 8 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2☆13Oct 10, 2021Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Jun 5, 2021Updated 4 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- ☆27May 6, 2024Updated last year
- The Location-based WiFi Services system: A Complete Open Source Solution for Wi-Fi Beacon Stuffing Based Location-based Services☆20Dec 9, 2016Updated 9 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Python API for the LimaCharlie.io service.☆21Updated this week
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- ☆27Jun 29, 2023Updated 2 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆49Jan 13, 2020Updated 6 years ago
- ☆24Sep 12, 2024Updated last year
- Complete list of discord bots and servers listings.☆20Sep 15, 2021Updated 4 years ago
- ☆23Sep 20, 2024Updated last year
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- A list of awesome iOS categories, extensions, utilities and components.☆12Aug 16, 2019Updated 6 years ago