☆9Updated this week
Alternatives and similar repositories for nebula
Users that are interested in nebula are comparing it to the libraries listed below
Sorting:
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆82Nov 15, 2025Updated 3 months ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Enumerate your Kubernetes cluster with just 1 command☆11Updated this week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆40Mar 23, 2024Updated last year
- Mythically inspired, blazing-fast port scanner built in Rust. Fear the divine ports ⚡☆14Nov 30, 2025Updated 3 months ago
- Random☆35Nov 30, 2022Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- A versatile and extendable web UI for FAL-AI, designed to seamlessly integrate with any FAL-AI API endpoint. This interface supports mode…☆15Sep 30, 2024Updated last year
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- Build sneaky & malicious LNK files.☆160Jul 16, 2025Updated 7 months ago
- this is a tcl script for unpacking bitrock packed archives☆16Sep 27, 2020Updated 5 years ago
- Zen Trust is a self-hosted SSH certificate authority, providing short-lived certificates for users and hosts.☆11Oct 31, 2023Updated 2 years ago
- Tool for end-to-end testing of proxy servers☆11Dec 24, 2022Updated 3 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- there are no winners☆21Mar 7, 2025Updated 11 months ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.☆10Dec 30, 2025Updated 2 months ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- ☆14Apr 27, 2019Updated 6 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- ☆11Feb 11, 2023Updated 3 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Use Rust to implement some Red Team techniques :)☆13Nov 11, 2024Updated last year
- ☆13Sep 7, 2024Updated last year
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago