The Jolly Executioner - a simple command execution proxy
☆16Jun 9, 2024Updated last year
Alternatives and similar repositories for jollyexec
Users that are interested in jollyexec are comparing it to the libraries listed below
Sorting:
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A repo for output of an intrusion prediction project☆11Feb 15, 2026Updated last week
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated last week
- WARNING: this requires a 32 bit build of node on osx! (tested only on osx)☆14Oct 24, 2011Updated 14 years ago
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 4 months ago
- ☆16Sep 6, 2017Updated 8 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- TBD - The Tmux Bash Debugger☆12Oct 23, 2024Updated last year
- This is an example showing how to export and import functions between a Rust application and Rust WebAssembly.☆15Jul 1, 2020Updated 5 years ago
- 🌀 A minimal C library offering generic, contiguous dynamic arrays with O(1) amortized push.☆19Sep 22, 2025Updated 5 months ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Ultimate Typescript Handbook, published by Orange AVA™☆11Jul 18, 2023Updated 2 years ago
- Fast, lightweight toy container system☆11Oct 18, 2020Updated 5 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 10 months ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- StackStorm pack with action aliases allowing to run Ansible in a ChatOps way☆10Feb 21, 2017Updated 9 years ago
- A JavaScript API for the UniFi Controller built with Loopback☆12Oct 17, 2018Updated 7 years ago
- IPC backed Buffers for Node.JS☆20Feb 17, 2011Updated 15 years ago
- LastArk - Giving LastPass Enterprise the Power of CyberArk's PIM☆15Jun 19, 2018Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 7 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- Visualizing TechEmpower benchmarks beyond requests per second☆15Apr 22, 2024Updated last year
- A (massive) DNS tools (reverse lookup for now)☆12Jul 6, 2022Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Dec 29, 2020Updated 5 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated last year
- MaybeSQL in SQLite: Best of both worlds☆14Feb 17, 2026Updated last week
- Application to stream data from RIPE RIS Live service☆14Mar 6, 2020Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago