WIP - Revamped Alfred [2.0]
☆40May 8, 2025Updated last year
Alternatives and similar repositories for Alfred
Users that are interested in Alfred are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Pwning Toolkit☆28May 3, 2026Updated 2 weeks ago
- Knowledge Base of Exploitation Techniques☆61May 3, 2026Updated 2 weeks ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 4 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- hack vm☆12Nov 30, 2019Updated 6 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- Proof Of Concepts☆56Jan 4, 2026Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- some pwn or re challenge in ctf games☆40Sep 24, 2019Updated 6 years ago
- tools, files, and scripts I use for PNPT and CRTO☆24Feb 21, 2022Updated 4 years ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 7 years ago
- ☆28Oct 4, 2021Updated 4 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 7 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆34Nov 21, 2020Updated 5 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- DOM XSS scanner for Single Page Applications☆415Nov 15, 2025Updated 6 months ago
- Automatically create safes and permission with role groups based on your enterprise standards and policies☆12Jul 31, 2018Updated 7 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 3 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 7 years ago
- A curated list of awesome threat detection and hunting resources☆19Apr 13, 2019Updated 7 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆10Sep 24, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆102Feb 16, 2019Updated 7 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- A simple, small in size and portable keylogger for Windows XP/Vista/7/8/10/11 that doesn't require .NET Framework.☆14Feb 16, 2022Updated 4 years ago