tehstoni / Sublime-Nmap-Syntax
A Sublime Text plugin that allows for Nmap syntax highlighting
☆13Updated 5 months ago
Alternatives and similar repositories for Sublime-Nmap-Syntax:
Users that are interested in Sublime-Nmap-Syntax are comparing it to the libraries listed below
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 3 months ago
- Simple netexec wraper with html repport☆17Updated 9 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A Moodle Scanner☆39Updated 3 months ago
- ☆11Updated 2 months ago
- Cobalt Strike BOFS☆15Updated last year
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆21Updated last year
- ☆33Updated 2 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆19Updated 6 months ago
- ☆14Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Phishing Framework for OTP codes☆18Updated last month
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- ☆58Updated 4 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated this week
- ☆11Updated 2 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆16Updated 5 months ago
- Inject RDPThief into memory with PowerShell.☆60Updated last month
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆43Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- A small red team course☆35Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- PowerShell Reverse Shell☆61Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 7 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated last week