ryananicholson / which-realityLinks
PHP code to determine which reality (Server OS and web app versions) the app is running in (yeah... it's a play on Rick and Morty)
☆12Updated last year
Alternatives and similar repositories for which-reality
Users that are interested in which-reality are comparing it to the libraries listed below
Sorting:
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Updated 4 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago
- Simple and efficient file shredding☆14Updated 6 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆23Updated 3 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Updated 4 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆42Updated 9 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Open YARA scan- and search engine☆25Updated 10 months ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- ☆24Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Updated 7 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Updated last month
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 months ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated last month
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago