Custom scripts used during the scenario
☆21Apr 5, 2021Updated 4 years ago
Alternatives and similar repositories for SlashPaulHoldings
Users that are interested in SlashPaulHoldings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆28Jan 31, 2017Updated 9 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Rebane's CTF tools☆13Feb 1, 2026Updated last month
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- A Python 3 API interface for updating Snipe-IT assets☆14Jan 7, 2022Updated 4 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 5 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- License Plate Recognition at character level☆10May 18, 2019Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- ☆26Dec 8, 2025Updated 3 months ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Security Tools written in Golang☆12Sep 2, 2020Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Python program that simulates the queuing systems at a small airport from customer arrival to departure☆11Apr 6, 2016Updated 9 years ago
- An example implementation of WOLA BATCH for z/OS Connect Enterprise Edition, including COBOL source files, sample JCLs, a matching zCEE A…☆10Sep 1, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- Jupiter Brain manages servers☆14Mar 29, 2019Updated 7 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago