☆27Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for EasyEnumeration
Users that are interested in EasyEnumeration are comparing it to the libraries listed below
Sorting:
- ☆200Jan 19, 2020Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆97Feb 18, 2025Updated last year
- ☆42Dec 22, 2020Updated 5 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Dive into world of ascii art☆10Apr 1, 2021Updated 4 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated last month
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Resources to learn tech (sharing useful links)☆17Oct 26, 2021Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- HTB writeup downloader☆24Aug 11, 2022Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- ☆48Dec 23, 2020Updated 5 years ago
- ☆16Apr 10, 2024Updated last year
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- slides for hardware hacking course produced by security society channel i introduce☆14Dec 29, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Sep 13, 2024Updated last year
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated last year