Tampermonkey script to extract information from Meteor applications
☆34Nov 3, 2016Updated 9 years ago
Alternatives and similar repositories for MeteorMiner
Users that are interested in MeteorMiner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A collection of nmap scripts I've written☆23Mar 27, 2016Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Aug 14, 2017Updated 8 years ago
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆21Jan 3, 2023Updated 3 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Email digest aggregator for fail2ban☆13Oct 9, 2024Updated last year
- Combinatorially flip bits by brute force until a file is no longer corrupted.☆11Sep 28, 2015Updated 10 years ago
- A Go (golang) Utility package for decoding Active Directory objectSID☆26Nov 26, 2019Updated 6 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Dec 22, 2014Updated 11 years ago
- ☆12May 8, 2020Updated 5 years ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Mass zone transfer python script☆16May 26, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Tool to extract entities from SQL Server (procedures, views, etc.)☆30Jan 5, 2017Updated 9 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago