☆15Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- Generate Parameter Recommendations for Argon2id in PHP 7.3+☆25Apr 19, 2021Updated 4 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Most common AWS S3 bucket names.☆29Jun 2, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- slam an HTTP/2 server a lot of concurrent load over a single TCP connection (for debugging something)☆29Mar 24, 2022Updated 3 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Gesture controlled music glove with two microbits☆11Jun 18, 2022Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Wordlists designed for generating passphrases☆41Jan 21, 2026Updated last month
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- Simulation engine involving a 2D universe populated by cells and entities☆10Jun 14, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Listen to the weather using Sonic Pi and data from Mathematica☆11Dec 6, 2018Updated 7 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Lambda to trigger Buildkite pipelines from GitHub comments☆23Jun 18, 2024Updated last year
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- A utility/cheat for Mu Online classic☆11Mar 11, 2018Updated 7 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- [Mu Online] Tool to reading MuError.log file.☆10Feb 4, 2020Updated 6 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- hashcat benchmarks on AWS instances☆39Sep 15, 2025Updated 5 months ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Crack passwords using Terraform and AWS☆43Mar 20, 2019Updated 6 years ago
- A software FIDO2/U2F authenticator☆52Dec 18, 2023Updated 2 years ago
- ☆10May 17, 2024Updated last year
- Explain and validate SQL queries as you type them into Datasette☆12Feb 28, 2024Updated 2 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago