A Go client for crobat
☆24Mar 12, 2020Updated 5 years ago
Alternatives and similar repositories for crobat-client
Users that are interested in crobat-client are comparing it to the libraries listed below
Sorting:
- ☆18Nov 24, 2020Updated 5 years ago
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 5 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Nov 6, 2018Updated 7 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆63Jun 1, 2023Updated 2 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- This project aims to capture network traffic on a local network, filter out packets related to WhatsApp calls, and extract the public IP …☆24Jan 21, 2025Updated last year
- The repository contains a reference end-to-end pipeline for a real-time video analytics application. Realtime data is provided to an infe…☆12Nov 3, 2025Updated 4 months ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆124Jan 9, 2018Updated 8 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- A Broken-URL Checker☆82Nov 2, 2017Updated 8 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Various tools for a Microsoft365DSC deployment, used in the M365DSC DevOps whitepaper☆11Jul 15, 2025Updated 7 months ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- ☆11Sep 23, 2023Updated 2 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- ☆51Apr 13, 2020Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Jun 27, 2019Updated 6 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- ☆11Mar 8, 2024Updated 2 years ago
- This package allows you to manage multiple assets with yarn's workspaces feature☆11Nov 27, 2018Updated 7 years ago
- dcsync bof☆45Feb 13, 2026Updated 3 weeks ago
- Парсинг тостера и стековерфлоу☆15Dec 30, 2015Updated 10 years ago
- Client libraries for the Charter App (available on the Mac App Store)☆21Apr 25, 2012Updated 13 years ago
- ☆14Sep 11, 2014Updated 11 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 8 years ago
- Rubber Ducky arming script wizard : Setup quickly your Rubber Ducky☆10Jan 18, 2018Updated 8 years ago