☆41Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Wakanda-Land
Users that are interested in Wakanda-Land are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A Python Obfuscator through AST modification☆26Nov 15, 2019Updated 6 years ago
- A PoC executing shellcode in Dart☆14Jun 28, 2022Updated 3 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated 3 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆31Feb 13, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 4 years ago
- This repo contains scripts to automate the addition of 3rd party Wazuh rules to your Wazuh installation☆18Dec 31, 2023Updated 2 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Nov 1, 2022Updated 3 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- A simple COM server which provides a component to run shellcode☆148May 12, 2020Updated 5 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- ☆22Jun 28, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Pascal Offsec repo for malware dev and red teaming 🚩☆190Oct 13, 2023Updated 2 years ago
- ☆20Jul 24, 2022Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 3 months ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- backdoor that uses dns to communicate☆35Aug 9, 2025Updated 8 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆88Mar 2, 2022Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Decode obfuscated ldap_default_authtok from sssd.conf☆28Mar 7, 2019Updated 7 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month