Legba recipes.
☆51Aug 21, 2024Updated last year
Alternatives and similar repositories for legba-cookbook
Users that are interested in legba-cookbook are comparing it to the libraries listed below
Sorting:
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- about me☆13Jun 23, 2025Updated 8 months ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Writeup on how to access Wifi pineapple GUI through non-management APs and fuzz web app login credentials☆15Dec 1, 2021Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- 🐺 A Thread Safe Connection Pooling.☆13Feb 11, 2026Updated 3 weeks ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆21Updated this week
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆61Jun 8, 2024Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- Administrate Brocade ICX switches over SSH with PowerShell☆15Sep 5, 2020Updated 5 years ago
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- Boot Image Tool is an Android app that helps juggle boot images for OTAs.☆20May 1, 2022Updated 3 years ago
- ☆241May 19, 2025Updated 9 months ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆21Apr 11, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆54Nov 17, 2025Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- A collection of Ducky Script payloads.☆19Feb 29, 2020Updated 6 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆521Updated this week