horshark / akb-explorerView external linksLinks
A command line tool to search AttackerKB.
☆53Jan 16, 2021Updated 5 years ago
Alternatives and similar repositories for akb-explorer
Users that are interested in akb-explorer are comparing it to the libraries listed below
Sorting:
- Exploits for the TryHackMe room hackerNote☆32Feb 20, 2020Updated 5 years ago
- Oh-My-Tmux script for TryHackMe, HackTheBox, or other VPN practice site☆14Mar 30, 2025Updated 10 months ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Jul 30, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Aug 30, 2018Updated 7 years ago
- Proof of Concept for CVE-2019-18634☆233Sep 12, 2021Updated 4 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆17Jul 26, 2024Updated last year
- Basic Website template Django 2.2 Example + Python3☆54Feb 9, 2022Updated 4 years ago
- ☆29Feb 11, 2022Updated 4 years ago
- Intelligence gathering framework☆15Jul 23, 2015Updated 10 years ago
- Scripts and One-Liners☆21Jan 31, 2025Updated last year
- Create a list of possible usernames for bruteforcing☆82Feb 18, 2024Updated last year
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer☆56Dec 20, 2019Updated 6 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Nov 10, 2024Updated last year
- KeePass 2.X dumper (CVE-2023-32784)☆25Nov 4, 2023Updated 2 years ago
- Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)☆25Dec 4, 2018Updated 7 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- ☆10Feb 5, 2026Updated last week
- ☆31Feb 3, 2026Updated last week
- ☆32Jun 12, 2024Updated last year
- HackerOne Staffs☆29Dec 9, 2019Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- Latest FUD GMail phishing webpage generator☆30Jun 27, 2020Updated 5 years ago
- Dotfiles and configuration for development machines☆11Sep 14, 2025Updated 4 months ago
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- A tool to spider Github or search URLs for various information leaks☆34May 22, 2023Updated 2 years ago
- بوت الاذكار ومواقيت الصلاة☆10Aug 27, 2022Updated 3 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆627Nov 6, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago