tehstoni / Sublime-Nmap-SyntaxLinks
A Sublime Text plugin that allows for Nmap syntax highlighting
☆13Updated 11 months ago
Alternatives and similar repositories for Sublime-Nmap-Syntax
Users that are interested in Sublime-Nmap-Syntax are comparing it to the libraries listed below
Sorting:
- ☆75Updated 4 months ago
- A Moodle Scanner☆42Updated 9 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆25Updated 9 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 4 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆107Updated last month
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- ☆112Updated 3 months ago
- Vast.ai Password Kracking☆84Updated 2 months ago
- Most Responder's configuration power in your hand.☆51Updated 7 months ago
- Simple netexec wraper with html repport☆19Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆114Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆35Updated 4 months ago
- Creating them Golden Tickets☆14Updated 2 weeks ago
- ☆36Updated 9 months ago
- Azure Service Subdomain Enumeration☆66Updated 11 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆59Updated this week
- ☆91Updated 7 months ago
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- ☆90Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆60Updated 2 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 9 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated 7 months ago
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆15Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆39Updated last year
- Everything and anything related to password spraying☆144Updated last year
- ☆60Updated 10 months ago