Obtain a clean-cut architecture at the launch of a mission and run some tests ( subdomain search, fuzzing, make screenshots on a given perimeter )
☆25Jul 18, 2023Updated 2 years ago
Alternatives and similar repositories for Yelaa
Users that are interested in Yelaa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.☆218Aug 26, 2024Updated last year
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Mar 1, 2026Updated 3 weeks ago
- ☆37Oct 3, 2023Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- Rust implementation of the DNSCAT2 protocol☆21Apr 29, 2021Updated 4 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Jul 9, 2022Updated 3 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- PeopleScrap is used to gather information (OSINT) about people in a company☆11Jan 22, 2019Updated 7 years ago
- Map binary data into a beautiful chart☆15Mar 20, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- GLPI vulnerabilities checking tool☆161Mar 10, 2026Updated 2 weeks ago
- An easy to use tool to apply adversarial attacks☆13Aug 9, 2024Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆71Mar 28, 2023Updated 2 years ago
- An LLVM clone modified for use in RetDec and associated tools.☆19Feb 3, 2025Updated last year
- GoLang sys全端口扫描☆13Jan 25, 2022Updated 4 years ago
- ☆19Sep 17, 2025Updated 6 months ago
- ☆17Feb 29, 2020Updated 6 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Paced web reader. An esoteric feed reader and workflow for keeping up to date online.☆25Jan 5, 2025Updated last year
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Jun 17, 2020Updated 5 years ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Feb 9, 2022Updated 4 years ago
- A CANoe project with CAPL and pannel for V348 full validation.☆17Aug 20, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆22Nov 25, 2019Updated 6 years ago
- DPAPI looting remotely and locally in Python☆543Mar 13, 2026Updated last week
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Minimalistic "Kanban boardish" client☆18Aug 17, 2020Updated 5 years ago
- ☆16Feb 11, 2022Updated 4 years ago
- CVE-2022-26809 PoC☆24Apr 13, 2022Updated 3 years ago