Active Directory share enumeration tool
☆12Apr 28, 2025Updated 10 months ago
Alternatives and similar repositories for ad_share_enum
Users that are interested in ad_share_enum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 7 months ago
- ☆12Feb 4, 2025Updated last year
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆42Nov 3, 2025Updated 4 months ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 2 weeks ago
- ANY.RUN sandbox detection collection☆22Aug 21, 2024Updated last year
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Basic Psexec clone, but in golang.☆17Jul 2, 2022Updated 3 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- 在线安软识别☆12Aug 6, 2025Updated 7 months ago
- GitHubApi CVE Poc监控工具☆14Jan 23, 2026Updated 2 months ago
- ☆17Jun 16, 2025Updated 9 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆56Jul 13, 2025Updated 8 months ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 8 months ago
- big file transfer, support various network protocols☆14Sep 14, 2022Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Jun 22, 2023Updated 2 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 11 months ago
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- ☆30Mar 15, 2026Updated last week
- A-to-Z Bug Bounty Hunting Tools☆95Mar 26, 2025Updated 11 months ago
- ☆83Aug 27, 2025Updated 6 months ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- ☆159Apr 4, 2025Updated 11 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 7 months ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- Super fast duplicate file finder written in Golang.☆44Mar 16, 2026Updated last week
- ☆16Jan 4, 2025Updated last year
- ExpFuzz字典☆21May 27, 2024Updated last year
- reverse engineering random malwares☆22Mar 12, 2026Updated last week
- Identify vulnerabilities in your API's using the OpenAPI Security Scanner☆12Dec 6, 2018Updated 7 years ago