My dotfiles for Linux boxes
☆57Feb 20, 2026Updated last week
Alternatives and similar repositories for dotfiles-linux
Users that are interested in dotfiles-linux are comparing it to the libraries listed below
Sorting:
- My dotfiles for Windows boxes☆28Feb 22, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆42Jan 14, 2026Updated last month
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Mobile android app to access optc-db.github.io☆11May 24, 2018Updated 7 years ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Divide full port scan results and use it for targeted Nmap runs☆329Jul 1, 2024Updated last year
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆89Mar 2, 2022Updated 4 years ago
- Pentester's Promiscuous Notebook☆527Feb 2, 2026Updated last month
- ☆15Sep 4, 2024Updated last year
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆159May 5, 2025Updated 9 months ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- More examples using the Impacket library designed for learning purposes.☆264Nov 4, 2022Updated 3 years ago
- Generate Proxy DLLs in Rust☆48Updated this week
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Mar 4, 2020Updated 6 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow