inguardians / ServifyThisView external linksLinks
☆43Mar 30, 2016Updated 9 years ago
Alternatives and similar repositories for ServifyThis
Users that are interested in ServifyThis are comparing it to the libraries listed below
Sorting:
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Apr 4, 2017Updated 8 years ago
- ☆18Sep 1, 2025Updated 5 months ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- Creating a Bind Shell in C☆18Aug 21, 2023Updated 2 years ago
- Terraform project to build AWS instances for pivot practice☆12May 15, 2023Updated 2 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- ☆40Dec 24, 2025Updated last month
- Simple HTTP async comms using standard GET/POST requests☆46Feb 5, 2026Updated last week
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 10 months ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- ☆19May 31, 2017Updated 8 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Python Tool for Host Enumeration☆50Mar 24, 2017Updated 8 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆48Jan 19, 2026Updated 3 weeks ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- Evasive Payload Delivery Server & C2 Redirector☆112Nov 3, 2025Updated 3 months ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Aug 14, 2015Updated 10 years ago
- Koppeling x Metatwin x LazySign☆216Aug 26, 2021Updated 4 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Shellcode injection using the Windows Debugging API☆165Jan 4, 2026Updated last month