Yet Another Wordlists Repo
☆127Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for YAWR
Users that are interested in YAWR are comparing it to the libraries listed below
Sorting:
- Various wordlists for bruteforce☆36Nov 9, 2021Updated 4 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Feb 24, 2026Updated last week
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- ☆13May 12, 2020Updated 5 years ago
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- Репозиторий содержит список вопросов по наступальной безопасности.☆359Oct 26, 2025Updated 4 months ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆42Dec 5, 2025Updated 2 months ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- ☆18Mar 16, 2021Updated 4 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- brute-forcing su for fun and possibly profit☆100May 22, 2019Updated 6 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆21Oct 22, 2020Updated 5 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆26May 6, 2025Updated 9 months ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- ☆38Jan 29, 2025Updated last year
- It's my solution for bugbounty automation☆22Feb 24, 2026Updated last week
- Research on abusing GitLab Runners☆31Jul 14, 2020Updated 5 years ago
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 10 months ago
- HackTheBox High Definition Badge Generator☆28Jul 1, 2019Updated 6 years ago
- NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.☆32Jul 16, 2021Updated 4 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- Исчерпывающее руководство по приватности и контр-ОСИНТ для Рунета и всего СНГ 🇷🇺☆604May 23, 2024Updated last year
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Jun 18, 2022Updated 3 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- CVE-2022-46463(Harbor 未授权)☆30Jul 15, 2025Updated 7 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago
- ☆29Oct 15, 2023Updated 2 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 5 years ago
- ☆71Feb 15, 2021Updated 5 years ago
- Compile shellcode into an exe file from Windows or Linux.☆72Jun 7, 2025Updated 8 months ago
- Laravel RCE exploit. CVE-2018-15133☆34Mar 22, 2022Updated 3 years ago