madalin-dogaru / profilerView external linksLinks
A Red Teaming tool focused on profiling the target.
☆29Jan 10, 2026Updated last month
Alternatives and similar repositories for profiler
Users that are interested in profiler are comparing it to the libraries listed below
Sorting:
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- Tool for efficient directory enumeration☆65Jan 27, 2026Updated 2 weeks ago
- ☆25Aug 2, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆111Feb 3, 2026Updated last week
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- ☆10Nov 24, 2018Updated 7 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Apr 24, 2023Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 2 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- An addon to import users from active directory to gophish☆19Mar 22, 2022Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Dec 7, 2025Updated 2 months ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 9 months ago
- A proof of concept exploit that tries to pop you a shell on a uftpd server between versions 2.6 and 2.10☆20Apr 16, 2020Updated 5 years ago