☆99Jun 22, 2025Updated 8 months ago
Alternatives and similar repositories for lalubuntu
Users that are interested in lalubuntu are comparing it to the libraries listed below
Sorting:
- SkillArch☆45Feb 25, 2026Updated last week
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆103Mar 30, 2025Updated 11 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆145Nov 20, 2025Updated 3 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆150Sep 4, 2025Updated 6 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆24Oct 1, 2023Updated 2 years ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆52Jul 8, 2024Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- Fully featured and community-driven hacking environment☆2,938Mar 1, 2026Updated last week
- Docker images of the Exegol project☆130Updated this week
- ☆166Nov 3, 2025Updated 4 months ago
- ☆93Dec 15, 2025Updated 2 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated 3 weeks ago
- Dynamically deploy containers for CTF challenges.☆21Nov 29, 2025Updated 3 months ago
- ☆22Dec 30, 2025Updated 2 months ago
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated 2 weeks ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆65Jun 25, 2025Updated 8 months ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆24Aug 17, 2025Updated 6 months ago
- A multithreaded bruteforcer of argon2 hashes.☆43Jun 4, 2025Updated 9 months ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆527Jul 31, 2024Updated last year
- ☆51Jan 20, 2022Updated 4 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆147Apr 21, 2025Updated 10 months ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated this week
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Some tips for Bug Bounty using LibreOffice☆56Feb 28, 2025Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last week
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆87Jun 16, 2021Updated 4 years ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆247Dec 8, 2025Updated 3 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆72Oct 24, 2025Updated 4 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆158Jun 24, 2025Updated 8 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Jul 9, 2022Updated 3 years ago
- implementation of ADS-B protocol in ruby☆11Aug 31, 2021Updated 4 years ago