☆120Jun 4, 2025Updated 10 months ago
Alternatives and similar repositories for pwnedhub
Users that are interested in pwnedhub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Nov 13, 2019Updated 6 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Automated 802.1x Bypass☆88Mar 11, 2020Updated 6 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆358Dec 19, 2025Updated 3 months ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Bulk IP to ASN submission to the Team Cymru Whois server. More info: http://www.team-cymru.org/IP-ASN-mapping.html☆15Oct 30, 2023Updated 2 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆97May 24, 2018Updated 7 years ago
- Official module repository for the Recon-ng Framework.☆261Jul 12, 2024Updated last year
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- Extreme Vulnerable Node Application☆95Nov 12, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- Execute Trickest workflows right from your terminal☆100Nov 26, 2025Updated 4 months ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- ☆250Jun 6, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- A simple website to act as a store for havoc modules and extensions☆30Jan 20, 2025Updated last year
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year