A Sublime Text plugin that allows for Nmap syntax highlighting
☆13Sep 14, 2024Updated last year
Alternatives and similar repositories for Sublime-Nmap-Syntax
Users that are interested in Sublime-Nmap-Syntax are comparing it to the libraries listed below
Sorting:
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Jan 21, 2024Updated 2 years ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Mar 12, 2022Updated 3 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆151Feb 25, 2025Updated last year
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- ☆13Jun 29, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- HackTheBox Machines to Notion Database for Writeups☆43Jan 27, 2025Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Updated this week
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Nov 1, 2022Updated 3 years ago
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆10Nov 29, 2021Updated 4 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆16May 10, 2024Updated last year
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆36Feb 12, 2026Updated 2 weeks ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year