WIP - Revamped Alfred [2.0]
☆40May 8, 2025Updated 10 months ago
Alternatives and similar repositories for Alfred
Users that are interested in Alfred are comparing it to the libraries listed below
Sorting:
- Knowledge Base of Exploitation Techniques☆60Apr 30, 2025Updated 10 months ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- ☆11May 14, 2021Updated 4 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- some pwn or re challenge in ctf games☆40Sep 24, 2019Updated 6 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Transform AWS Config snapshots to a more AWS Athena-friendly format.☆11Aug 26, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- DOM XSS scanner for Single Page Applications☆414Nov 15, 2025Updated 4 months ago
- Automatically create safes and permission with role groups based on your enterprise standards and policies☆12Jul 31, 2018Updated 7 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Proof of concept incident response demo using SSM and AWS Fargate.☆14Dec 5, 2019Updated 6 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆101Feb 16, 2019Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- My attempt at writing exploit POCs for various CVEs☆16Feb 8, 2020Updated 6 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago