tehstoni / Sublime-Nmap-Syntax
A Sublime Text plugin that allows for Nmap syntax highlighting
☆13Updated 7 months ago
Alternatives and similar repositories for Sublime-Nmap-Syntax:
Users that are interested in Sublime-Nmap-Syntax are comparing it to the libraries listed below
- Simple netexec wraper with html repport☆18Updated 10 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- A Moodle Scanner☆40Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- ☆34Updated 4 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated 2 weeks ago
- Dumping LSASS Evaded Endpoint Security Solutions☆12Updated 2 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated 2 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Cobalt Strike BOFS☆15Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 4 months ago
- Used to get NTLMv2 Hashes from SMB☆12Updated 5 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- Recon scripts for Red Team and Web blackbox auditing☆23Updated last month
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- ☆51Updated last year
- ☆14Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- Most Responder's configuration power in your hand.☆47Updated 2 months ago
- ☆11Updated 4 months ago
- A small red team course☆37Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 4 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆11Updated 4 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago