☆42Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Wakanda-Land
Users that are interested in Wakanda-Land are comparing it to the libraries listed below
Sorting:
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- A Python Obfuscator through AST modification☆27Nov 15, 2019Updated 6 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 weeks ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆17Sep 12, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆159Nov 1, 2022Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Opensource repository for DVID V2☆17Jun 3, 2025Updated 8 months ago
- A simple COM server which provides a component to run shellcode☆149May 12, 2020Updated 5 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Decode obfuscated ldap_default_authtok from sssd.conf☆29Mar 7, 2019Updated 6 years ago
- Pascal Offsec repo for malware dev and red teaming 🚩☆191Oct 13, 2023Updated 2 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆81Mar 30, 2023Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Oct 1, 2022Updated 3 years ago
- ☆58Jun 2, 2025Updated 8 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆15Oct 14, 2024Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A robust Red Team proxy written in Go.☆165Dec 26, 2021Updated 4 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- Convert shellcode into different formats!☆358Jan 24, 2023Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆89Mar 2, 2022Updated 3 years ago