kryptops / lycanthropyView external linksLinks
Java DNS Post Exploitation Tool
☆11Jul 21, 2024Updated last year
Alternatives and similar repositories for lycanthropy
Users that are interested in lycanthropy are comparing it to the libraries listed below
Sorting:
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 6 months ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- A 100% FREE replication of the knowledge base for HighLevel/GoHighLevel.☆37Aug 15, 2025Updated 5 months ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Scanning in the middlelayer, v2☆10Updated this week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated last year
- ☆15Feb 2, 2025Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆42Aug 12, 2022Updated 3 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- ☆11Apr 24, 2020Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- Enhanced-PsExec the GUI edition☆13Sep 8, 2021Updated 4 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- ☆11Jun 25, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- C# client for SonarQube 8.x☆11Apr 6, 2023Updated 2 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- Scans a given directory tree for interesting assembly references☆17Jan 22, 2026Updated 3 weeks ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Smart Content Management System using Spring Boot☆17Jan 28, 2026Updated 2 weeks ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- ☆10Nov 26, 2024Updated last year
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- ☆15Jan 5, 2025Updated last year
- Chrome Extensions Dataset☆10Updated this week
- TONBI is a source code auditing scanner against framework based web application. It hunts for various vulnerabilites in such as Laravel, …☆10Jan 25, 2022Updated 4 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 4 years ago
- Want to run the WOPR over telnet? This server does just that!☆14Apr 10, 2017Updated 8 years ago