spyx / shaktiLinks
☆9Updated 4 years ago
Alternatives and similar repositories for shakti
Users that are interested in shakti are comparing it to the libraries listed below
Sorting:
- Work in Progress repo☆14Updated 6 years ago
- Free Email Providers☆11Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆18Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- ☆12Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Very loud vBulletin exploit☆14Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- ☆24Updated 5 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 7 months ago
- Data EXfiltration TestER☆21Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- visually see issues with supported cipher suites☆16Updated last year