goproslowyo / trumpetLinks
Announces arrivals and departures in voice chat via TTS.
☆9Updated last year
Alternatives and similar repositories for trumpet
Users that are interested in trumpet are comparing it to the libraries listed below
Sorting:
- A lockout aware password sprayer☆15Updated 3 years ago
- A collection of Offensive Go packages.☆214Updated 3 years ago
- Dredging up secrets from the depths of the file system☆129Updated 9 months ago
- ☆61Updated 3 years ago
- Tools and blogs I use to perform GCP red teams☆124Updated last year
- Infrastructure Automation☆351Updated last year
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆48Updated last year
- HackTheBox Machines to Notion Database for Writeups☆42Updated 6 months ago
- ☆188Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 3 months ago
- Azure mindmap for penetration tests☆188Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆168Updated last week
- Powershell script to extract information from boot PXE☆147Updated 6 years ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆189Updated 11 months ago
- OWASP Foundation web repository☆38Updated 6 months ago
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- Manufacturing Truth since 1984☆11Updated last year
- Active Directory Labs/exams Review☆258Updated 4 years ago
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆130Updated this week
- winPEAS, but for Active Directory☆154Updated 4 months ago
- Your template-based BloodHound terminal companion tool☆400Updated this week
- Source Code Management Attack Toolkit☆132Updated 2 years ago
- My attempt at weaponizing Discord.☆18Updated 3 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆189Updated 5 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆212Updated 2 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆90Updated 4 months ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆218Updated 3 years ago
- ☆66Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆210Updated last year