Python Script to Exploit SpoolService/Printer Bug on Exchange - Thanks to @3xocyte
☆22Sep 2, 2019Updated 6 years ago
Alternatives and similar repositories for dementor
Users that are interested in dementor are comparing it to the libraries listed below
Sorting:
- Some private tools i decided to release for public.☆49Mar 14, 2024Updated last year
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- security advisories☆12Feb 22, 2021Updated 5 years ago
- ☆17Dec 14, 2022Updated 3 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- ☆27Dec 20, 2021Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- ☆14Apr 29, 2021Updated 4 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Jul 8, 2020Updated 5 years ago
- Github action for monitoring CVE☆43Updated this week
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- cydia源☆10Mar 20, 2022Updated 3 years ago
- Find the zone of the mobile number using the suffix code☆15Aug 17, 2022Updated 3 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- 各种漏洞poc、Exp的收集或编写☆32Jun 24, 2016Updated 9 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- ☆49Feb 10, 2019Updated 7 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆12Jul 13, 2020Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- BMW CarData MQTT client and bridge – Connects the BMW ConnectedDrive data stream to a local Mosquitto MQTT broker.☆41Oct 19, 2025Updated 4 months ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago