☆118Jun 4, 2025Updated 9 months ago
Alternatives and similar repositories for pwnedhub
Users that are interested in pwnedhub are comparing it to the libraries listed below
Sorting:
- ☆21Nov 13, 2019Updated 6 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆355Dec 19, 2025Updated 3 months ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Official module repository for the Recon-ng Framework.☆257Jul 12, 2024Updated last year
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- Extreme Vulnerable Node Application☆95Nov 12, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Burp as a Docker Container☆59Aug 21, 2020Updated 5 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆250Jun 6, 2018Updated 7 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- A simple website to act as a store for havoc modules and extensions☆29Jan 20, 2025Updated last year
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- vulnerable single sign on☆149Aug 1, 2024Updated last year
- A client compatible with Metasploit's staging protocol☆264Aug 21, 2017Updated 8 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- ☆24Jan 31, 2016Updated 10 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆97Aug 14, 2018Updated 7 years ago