The Jolly Executioner - a simple command execution proxy
☆16Jun 9, 2024Updated last year
Alternatives and similar repositories for jollyexec
Users that are interested in jollyexec are comparing it to the libraries listed below
Sorting:
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Apr 10, 2024Updated last year
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 3 months ago
- RFC8345-based Network Topology Modeling Toolbox☆20Feb 21, 2024Updated 2 years ago
- ☆23Mar 4, 2025Updated last year
- Audit log wall of shame.☆42Aug 20, 2025Updated 7 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A JavaScript API for the UniFi Controller built with Loopback☆12Oct 17, 2018Updated 7 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- ISC Performance Lab☆12Feb 22, 2026Updated last month
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆16May 29, 2024Updated last year
- Application to stream data from RIPE RIS Live service☆14Mar 6, 2020Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- EOS Extension to alert and change configuration based on host(s) ICMP reachability☆11Nov 6, 2025Updated 4 months ago
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- MiniEDR is a kernel-mode process monitor that logs creations & terminations via a named pipe. Built for research & learning, exploring Wi…☆18Feb 19, 2025Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Miscellaneous scripts☆15Jan 12, 2021Updated 5 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Filter elements for JunOS RE☆13Aug 30, 2023Updated 2 years ago
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated last month
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- ☆19Aug 6, 2021Updated 4 years ago