enes-ismaili / En0wnView external linksLinks
Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.
☆23Jan 13, 2026Updated last month
Alternatives and similar repositories for En0wn
Users that are interested in En0wn are comparing it to the libraries listed below
Sorting:
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆31Jan 19, 2026Updated 3 weeks ago
- Collected resources for OSWA preparation.☆25Jan 25, 2023Updated 3 years ago
- My notes while studying for the PNPT from TCM Security.☆81Mar 30, 2024Updated last year
- ☆21May 25, 2025Updated 8 months ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆15Aug 26, 2025Updated 5 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated last month
- ☆11Aug 12, 2025Updated 6 months ago
- ☆14Jan 20, 2026Updated 3 weeks ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- ☆18Apr 27, 2025Updated 9 months ago
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- 为初学者开发的爆破靶场。☆29Nov 28, 2025Updated 2 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Toolbox for modifying/updating/backing up Nissan LEAF Head Unit☆25Nov 30, 2025Updated 2 months ago
- Step-by-step guide learning Go as another automation language for network automation engineers☆10May 3, 2025Updated 9 months ago
- A simple JQuery based library to navigate between sections in a scrollable website☆11Jan 7, 2016Updated 10 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆15Jun 2, 2025Updated 8 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 6 months ago
- Memory for Coding Agents☆26Feb 4, 2026Updated last week
- Instructions for hacking and cloning RFID cards☆18Nov 28, 2023Updated 2 years ago
- ☆12May 11, 2024Updated last year
- HIPAA-eligible DIY Twilio alternative for voice AI telephone applications. Uses Asterisk PBX and AWS Chime SIP trunking.☆17Jan 6, 2026Updated last month
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated 3 weeks ago
- ☆11Aug 18, 2023Updated 2 years ago
- OSCP material tools and helpful scripts.☆10Mar 14, 2025Updated 11 months ago
- ☆10Mar 31, 2024Updated last year
- C Learning & Mini-projects☆13May 20, 2023Updated 2 years ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Tactical Race Exploitation & Concurrency Orchestrator☆25Jan 4, 2026Updated last month
- My mobile writeups repository☆23Nov 19, 2025Updated 2 months ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 6 months ago
- ☆15Aug 20, 2024Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 3 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 3 years ago
- CCNA v7 Packet Tracer explanations and codes☆21Feb 28, 2021Updated 4 years ago
- Scripts for Pentesting☆13May 29, 2025Updated 8 months ago
- ☆32Oct 9, 2025Updated 4 months ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago