Loot email addresses from commit entries
☆58Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for githump
Users that are interested in githump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- CableTap public disclosure documents.☆79Jul 29, 2017Updated 8 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆25May 23, 2022Updated 3 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- lsnfc is a simple command that lists tags which are in your NFC device field☆29Apr 7, 2015Updated 11 years ago
- AHA! Website Source☆19Mar 29, 2026Updated last week
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 4 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Jun 26, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆491May 23, 2023Updated 2 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆18Mar 10, 2023Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago