☆44Jan 14, 2026Updated last month
Alternatives and similar repositories for endpoint
Users that are interested in endpoint are comparing it to the libraries listed below
Sorting:
- ☆22Mar 4, 2025Updated 11 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆22Jan 1, 2023Updated 3 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆21Apr 26, 2024Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Jun 11, 2019Updated 6 years ago
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Nov 28, 2024Updated last year
- Linux Shared Library to Shellcode Loader☆84Feb 15, 2026Updated 2 weeks ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- ☆35May 31, 2023Updated 2 years ago
- ☆80Jan 26, 2025Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆43Apr 14, 2024Updated last year
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- Generate malware with AI☆99Updated this week
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- A standard-derived suite of cryptography libraries for the TI-84+ CE graphing calculator.☆14Jan 24, 2026Updated last month
- Little demo application that uses the background geolocation Cordova plugin.☆10Jun 19, 2017Updated 8 years ago
- PowerShell Module for Infoblox☆12Jun 28, 2015Updated 10 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Rust MCP framework for building AI agents☆22Dec 28, 2025Updated 2 months ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- A Nagios plugin to monitor build time of Jenkins jobs☆15Jun 24, 2020Updated 5 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 2 months ago
- The Bro/Zeek language cheat sheet☆53Mar 8, 2013Updated 12 years ago
- Docker templates for unRAID☆11Feb 23, 2026Updated last week
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 7 months ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- Run Graphite with Docker☆10Jan 25, 2019Updated 7 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 3 years ago
- 🔥 Burning your XML documents to the ground? Yes please. In the mean time, let's use lit-xml.☆11Updated this week
- Powershell statsd client☆21Oct 17, 2013Updated 12 years ago
- iDevice Exploit Injector☆10Jun 20, 2012Updated 13 years ago