realytcracker / go-jamcrackerView external linksLinks
a simple animal jam brute force password cracker with concurrency
☆42Mar 8, 2022Updated 3 years ago
Alternatives and similar repositories for go-jamcracker
Users that are interested in go-jamcracker are comparing it to the libraries listed below
Sorting:
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测 脚本☆11Feb 23, 2023Updated 2 years ago
- ☆10Oct 5, 2019Updated 6 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆45Jun 24, 2023Updated 2 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- Application Security Mind Maps☆10Apr 10, 2021Updated 4 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 2 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- A fork of the golang built in log package to add support for levels☆14Oct 15, 2021Updated 4 years ago
- Template to detect some malware☆13Aug 7, 2023Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- Slacker - Easy access to the Slack API and admin of workspaces/teams.☆15Apr 23, 2019Updated 6 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- OSCP Preperation☆14Aug 12, 2021Updated 4 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆12Jan 10, 2022Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 4 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Terminal multiplexer library. The core library for pymux, which is a pure Python tmux clone.☆12Feb 20, 2014Updated 11 years ago
- my n00b notes on web_study☆16May 29, 2025Updated 8 months ago
- Some Notes because i am too lazy to search☆12May 10, 2021Updated 4 years ago
- tool that generates bypasses for open redirects☆52Apr 18, 2022Updated 3 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 10 months ago