☆41Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Wakanda-Land
Users that are interested in Wakanda-Land are comparing it to the libraries listed below
Sorting:
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A Python Obfuscator through AST modification☆26Nov 15, 2019Updated 6 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- This repo contains scripts to automate the addition of 3rd party Wazuh rules to your Wazuh installation☆18Dec 31, 2023Updated 2 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- ☆22Jun 28, 2025Updated 8 months ago
- Pascal Offsec repo for malware dev and red teaming 🚩☆190Oct 13, 2023Updated 2 years ago
- ☆20Jul 24, 2022Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 3 months ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- backdoor that uses dns to communicate☆34Aug 9, 2025Updated 7 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆88Mar 2, 2022Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 3 years ago
- Decode obfuscated ldap_default_authtok from sssd.conf☆28Mar 7, 2019Updated 7 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago