mantvydasb / network-playgroundView external linksLinks
Network and web related exploratory playground.
☆19Apr 6, 2016Updated 9 years ago
Alternatives and similar repositories for network-playground
Users that are interested in network-playground are comparing it to the libraries listed below
Sorting:
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51May 1, 2023Updated 2 years ago
- Automatical Attacker for Weblogic☆11Mar 25, 2018Updated 7 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- A Ruby interface to standard cryptographic primitives☆19Oct 31, 2023Updated 2 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Cross-platform provider for Summon that talks to keyrings.☆17Nov 5, 2025Updated 3 months ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 3 weeks ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- Secure Coding in Go☆23Aug 4, 2024Updated last year
- ☆18Aug 20, 2017Updated 8 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 3 years ago
- Ansible role to deploy Cyberark Password Vault Web Access☆20Dec 1, 2025Updated 2 months ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)☆22Aug 31, 2018Updated 7 years ago
- ☆22Feb 2, 2026Updated last week
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Disposable and resilient red team infrastructure with Terraform☆278Feb 1, 2019Updated 7 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆23Jul 15, 2021Updated 4 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 7 years ago
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆29May 11, 2015Updated 10 years ago
- Cyberark secrets provider for k8s☆29Jan 12, 2026Updated last month
- This Powershell script is designed to be run on a supported (by Microsoft) Windows host. It checks for the most common issues that will p…☆30Jul 16, 2021Updated 4 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago