Recon scripts for Red Team and Web blackbox auditing
☆26Feb 20, 2026Updated last week
Alternatives and similar repositories for Prometheus
Users that are interested in Prometheus are comparing it to the libraries listed below
Sorting:
- ☆22Dec 30, 2025Updated last month
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆17Sep 12, 2022Updated 3 years ago
- HydraUSB3 V1 is an open source developer kit for the WCH CH569 MCU to experiment with streaming / high-speed protocols(USB2 HS, USB3 SS, …☆39Jan 22, 2024Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- ☆24Jun 9, 2024Updated last year
- Opensource repository for DVID V2☆17Jun 3, 2025Updated 8 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆30Feb 18, 2026Updated last week
- Write ups for Ph0wn CTF☆48Aug 12, 2025Updated 6 months ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- ☆12Apr 26, 2022Updated 3 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Mythic C2 Agent written in x64 PIC C☆85Jan 29, 2025Updated last year
- ☆21Jan 8, 2026Updated last month
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- Remotely dump NT hashes through Windows Crash dumps☆34Oct 29, 2024Updated last year
- ☆216Mar 26, 2024Updated last year
- GLPI vulnerabilities checking tool☆158Dec 4, 2025Updated 2 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆15Oct 14, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- ☆31May 23, 2024Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 weeks ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 3 years ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- APK downloader from few sources☆136Aug 18, 2025Updated 6 months ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 8 months ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- Kiwi PN532 SPI library for Arduino☆16Feb 2, 2026Updated 3 weeks ago