An advanced graphical search engine for Exploit-DB
☆120May 29, 2024Updated last year
Alternatives and similar repositories for houndsploit
Users that are interested in houndsploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An advanced command-line search engine for Exploit-DB☆16Sep 30, 2021Updated 4 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- An Ansible role for installing Cobalt Strike.☆80Mar 13, 2026Updated 2 weeks ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆490Jul 23, 2020Updated 5 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- gather gather gather☆583Mar 15, 2025Updated last year
- Python script wrote to automate the process of generating various reverse shells.☆200Jan 3, 2026Updated 2 months ago
- Miscellaneous Tools☆270Oct 29, 2020Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆380Feb 1, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆271Mar 24, 2021Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Jul 13, 2019Updated 6 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 3 years ago