shakenetwork / nishangView external linksLinks
Nishang - PowerShell for penetration testing and offensive security.https://github.com/samratashok/nishang/blob/master/Gather/Invoke-SSIDExfil.ps1
☆36Sep 10, 2017Updated 8 years ago
Alternatives and similar repositories for nishang
Users that are interested in nishang are comparing it to the libraries listed below
Sorting:
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Forward EKS CloudWatch k8s audit events to Sysdig secure☆27Aug 14, 2023Updated 2 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- ☆35Jan 4, 2026Updated last month
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Face recognition python project☆10Sep 23, 2022Updated 3 years ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Updated this week
- ☆13Jun 29, 2023Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆13Jul 26, 2025Updated 6 months ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Various dll hollowing techniques☆10Feb 29, 2024Updated last year
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 9 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago