Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error network enumeration.
☆67Jan 11, 2026Updated last month
Alternatives and similar repositories for Zero-E
Users that are interested in Zero-E are comparing it to the libraries listed below
Sorting:
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Apr 7, 2024Updated last year
- ☆20Jun 26, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 9 months ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Go☆33Sep 3, 2025Updated 6 months ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆44Nov 29, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆16Jun 15, 2025Updated 8 months ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Feb 26, 2026Updated last week
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Mar 10, 2024Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- ☆28Jan 6, 2024Updated 2 years ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆75Updated this week
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated 11 months ago
- Awesome MalDev Links☆39Feb 27, 2026Updated last week
- Quickly find all identities someone has used on their Github commits☆17Jul 28, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year