Nishang - PowerShell for penetration testing and offensive security.https://github.com/samratashok/nishang/blob/master/Gather/Invoke-SSIDExfil.ps1
☆36Sep 10, 2017Updated 8 years ago
Alternatives and similar repositories for nishang
Users that are interested in nishang are comparing it to the libraries listed below
Sorting:
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Forward EKS CloudWatch k8s audit events to Sysdig secure☆27Aug 14, 2023Updated 2 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- ☆35Jan 4, 2026Updated 2 months ago
- This repository contains links to awesome security articles.☆42Aug 2, 2025Updated 7 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- This is a repo for camphish tool for kali linux develop by thelinuxchoise and techchip☆10Nov 2, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Face recognition python project☆10Sep 23, 2022Updated 3 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆17May 22, 2024Updated last year
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- ☆11Feb 3, 2022Updated 4 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- EWDK C++ toolchain for bazel☆11Feb 1, 2026Updated last month
- flood a network with so much traffic that it cannot operate or communicate as it normally.☆16Aug 27, 2021Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- ☆14Apr 6, 2025Updated 11 months ago