☆10Jan 8, 2018Updated 8 years ago
Alternatives and similar repositories for LaZagne
Users that are interested in LaZagne are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Web shell generation tool written in go☆12Feb 28, 2023Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- ☆16Jan 2, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Feb 9, 2022Updated 4 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago
- ☆14Dec 5, 2024Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- A repo to setup LEMP stack quickly on Ubuntu 20 or later☆16Apr 22, 2025Updated 11 months ago
- XXST-白加黑辅助挖掘工具,全程静默运行不影响正常使用☆17Apr 12, 2024Updated last year
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- 应急响应工具&文档☆16May 27, 2024Updated last year
- ☆23Jan 2, 2023Updated 3 years ago
- PowerShell PE Parser☆63Jun 28, 2024Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Web-based sensor management suite☆20Mar 2, 2023Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- ICS protocol traffic generators☆23Oct 25, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Mar 8, 2026Updated 3 weeks ago
- RCE Exploit for Gitlab < 13.9.4☆51Jun 4, 2021Updated 4 years ago
- redis图形化漏洞利用工具☆30Updated this week
- ☆27Aug 15, 2022Updated 3 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- ☆27Jun 3, 2023Updated 2 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 2 months ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- ☆26Jul 17, 2024Updated last year
- weblogic漏洞利用工具☆17Jul 16, 2020Updated 5 years ago