p0dalirius / gitea-extract-users
A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.
☆14Updated 2 months ago
Alternatives and similar repositories for gitea-extract-users:
Users that are interested in gitea-extract-users are comparing it to the libraries listed below
- Multithreaded spraying of a password on all accounts of a domain.☆20Updated 2 months ago
- A Python script to find tenant id an region from a list of domain names.☆14Updated 2 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Beacon Object Files used for Cobalt Strike☆18Updated last year
- Simple reverse ICMP shell☆13Updated 11 months ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆18Updated 2 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆16Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated last year
- ☆13Updated 3 months ago
- ☆48Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆14Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated 2 years ago
- string encryption in Nim☆19Updated 10 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆12Updated 3 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 4 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 9 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Templating with sinister modules☆16Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆10Updated 2 months ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year