My dotfiles for Windows boxes
☆29Apr 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for dotfiles-windows
Users that are interested in dotfiles-windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My dotfiles for Linux boxes☆57Apr 3, 2026Updated 2 weeks ago
- Windows Network File System Remote exploit for CVE-2022-30136☆15Jul 11, 2023Updated 2 years ago
- ☆28Apr 10, 2026Updated last week
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Chlorian MIDI Player☆10Dec 6, 2017Updated 8 years ago
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Mar 4, 2020Updated 6 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Random one-offs that need a temporary home☆13Jan 28, 2026Updated 2 months ago
- Minimalist local weather app powered by Visual Crossing☆16Updated this week
- File Crawler index files and search hard-coded credentials☆36Feb 8, 2025Updated last year
- Google Cloud Datastore storage module for Botkit☆14Jul 1, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- Intune goodies☆10Dec 20, 2019Updated 6 years ago
- Chocolatey 'docker' package☆12Jan 21, 2019Updated 7 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A lightweight Pyramid blog application suitable for introducing Python web development.☆11Oct 17, 2016Updated 9 years ago
- Pentester's Promiscuous Notebook☆534Feb 2, 2026Updated 2 months ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- ☆10Mar 2, 2023Updated 3 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- ☆13Feb 5, 2020Updated 6 years ago
- Convert internet traffic to music.☆23Feb 22, 2014Updated 12 years ago
- A simple Salesforce bot for Slack☆13Apr 18, 2018Updated 8 years ago
- ☆10Apr 13, 2021Updated 5 years ago
- ☆12Jan 27, 2021Updated 5 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago