A tool for recovering server credentials from a pgadmin4 database
☆20Oct 16, 2021Updated 4 years ago
Alternatives and similar repositories for pga4decrypt
Users that are interested in pga4decrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 2 months ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Exploiting misconfigured firebase databases☆124Jun 5, 2019Updated 6 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆56Dec 30, 2019Updated 6 years ago
- Simple Chrome Extension to Add Check Marks in Gmail ✓✓☆11May 3, 2018Updated 7 years ago
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- ☆50Dec 15, 2025Updated 3 months ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813☆68Feb 22, 2020Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- A Reflected / Stored / DOM XSS Scanner based on Headless Chrome Node API via Puppeteer☆40Jan 7, 2023Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Exploit for w3-total-cache☆17Jan 11, 2013Updated 13 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆20Jun 30, 2020Updated 5 years ago
- Web Application Exploitation Environment☆11Jun 27, 2018Updated 7 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- A parser/timeline creator for auditd logs.☆16Aug 5, 2014Updated 11 years ago
- A .git/ folder disclosure exploit☆21Jul 14, 2019Updated 6 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Security Policies and Procedures for @feross projects☆14Mar 26, 2019Updated 6 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆19Aug 8, 2018Updated 7 years ago