tehstoni / Sublime-Nmap-SyntaxLinks
A Sublime Text plugin that allows for Nmap syntax highlighting
☆13Updated 8 months ago
Alternatives and similar repositories for Sublime-Nmap-Syntax
Users that are interested in Sublime-Nmap-Syntax are comparing it to the libraries listed below
Sorting:
- Simple netexec wraper with html repport☆19Updated last year
- A Moodle Scanner☆42Updated 6 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆30Updated last week
- Dumping LSASS Evaded Endpoint Security Solutions☆12Updated 3 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 6 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 9 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Used to get NTLMv2 Hashes from SMB☆13Updated 7 months ago
- Cobalt Strike BOFS☆16Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆23Updated 3 months ago
- ☆11Updated 6 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Phishing Framework for OTP codes☆31Updated 2 weeks ago
- ☆27Updated 2 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- ☆14Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- A small red team course☆39Updated last year
- Creating a Malicious Macro using MS Word☆22Updated 2 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆15Updated last month
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated last month
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year