Finding secrets in various (non-text) popular files.
☆53Oct 21, 2025Updated 5 months ago
Alternatives and similar repositories for crawl
Users that are interested in crawl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated 10 months ago
- It's my solution for bugbounty automation☆22Feb 24, 2026Updated last month
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆47Jan 14, 2026Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆79Jun 11, 2024Updated last year
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- 📧 [Research] E-Mail Injection: Vulnerable applications☆17May 26, 2024Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- ☆16Jun 15, 2025Updated 9 months ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Living Off the Foreign Land setup scripts☆75Feb 26, 2025Updated last year
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- ASPX Web Shell with COFF Loader☆124Mar 10, 2026Updated 2 weeks ago
- Public OCI-Image (docker image) Security Checker☆21Feb 16, 2026Updated last month
- NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.☆32Jul 16, 2021Updated 4 years ago
- ☆46Sep 24, 2025Updated 6 months ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Decrypting yandex browser passwords☆29Apr 8, 2025Updated 11 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆18Jul 3, 2020Updated 5 years ago
- A powerful Burp Suite extension that helps in converting requests between different formats, making web application testing more efficien…☆13Nov 18, 2024Updated last year
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- 1C Exploit Kit☆79Dec 8, 2021Updated 4 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- ☆164May 5, 2025Updated 10 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- My Wi-Fi scripts☆51Jun 23, 2024Updated last year
- reverse socks tunneler with ntlm and proxy support☆29Nov 24, 2019Updated 6 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 4 years ago
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- ☆16Nov 11, 2022Updated 3 years ago