An offensive attack framework for Distributed Layer of Modern Applications
☆85Feb 5, 2020Updated 6 years ago
Alternatives and similar repositories for Garfield
Users that are interested in Garfield are comparing it to the libraries listed below
Sorting:
- ☆33Oct 27, 2016Updated 9 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- ☆16May 9, 2016Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago