☆16Aug 25, 2025Updated 6 months ago
Alternatives and similar repositories for DefCon33
Users that are interested in DefCon33 are comparing it to the libraries listed below
Sorting:
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated last month
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Nov 5, 2025Updated 4 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- A curated collection of bug bounty tips, tricks, payloads, and bypass techniques☆33Feb 17, 2026Updated last month
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- ☆18Jan 9, 2025Updated last year
- JWTLens - Burp Suite extension for automated JWT security testing. 62 checks: passive scanning, algorithm confusion, signature bypass, …☆30Updated this week
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- 记录一些国外漏洞赏金猎人的挖洞技巧和一些有意思的东西☆39Dec 4, 2019Updated 6 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 4 years ago
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 2 months ago
- Terraform ECX Fabric Provider☆10Mar 1, 2023Updated 3 years ago
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- ☆19Sep 1, 2025Updated 6 months ago
- AI-VAPT is an autonomous AI-driven Vulnerability Assessment & Penetration Testing framework combining traditional VAPT with neural intell…☆88Oct 7, 2025Updated 5 months ago
- ☆17Oct 15, 2024Updated last year
- The Zen Development Kit☆61Dec 22, 2025Updated 2 months ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆30Jan 21, 2026Updated last month
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 3, 2026Updated 2 weeks ago
- Block abused TLDs in Tenant Allow BlockList☆14Jan 21, 2026Updated last month
- ☆18Dec 23, 2024Updated last year
- Windows Active DIrectory Pentesting documentation.☆19Jun 14, 2024Updated last year
- ☆74Feb 16, 2026Updated last month
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆39May 5, 2025Updated 10 months ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated 2 months ago
- The official Exploit Database repository☆47Dec 2, 2017Updated 8 years ago
- Easy-to-use subdomain enumerator.☆19Nov 13, 2025Updated 4 months ago
- ☆22Apr 11, 2025Updated 11 months ago
- ☆24Mar 6, 2026Updated 2 weeks ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 weeks ago