Spawn Up quickly Elastic EDR Panel
☆13Jan 29, 2022Updated 4 years ago
Alternatives and similar repositories for Elastic_Panel_AutoInstall
Users that are interested in Elastic_Panel_AutoInstall are comparing it to the libraries listed below
Sorting:
- Const FNV1A hashing implementation.☆15Aug 13, 2022Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆26Sep 3, 2020Updated 5 years ago
- LdrLoadDll Unhooking☆135Jan 16, 2022Updated 4 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- load and unload dynamic library☆14Aug 10, 2022Updated 3 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 9 years ago
- ☆25Jul 11, 2022Updated 3 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- ☆13Dec 11, 2025Updated 3 months ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Windows named pipes bindings for tokio☆12Sep 26, 2018Updated 7 years ago
- A tool used for encoding and decoding bas64 hash codes in termux.☆21Feb 10, 2021Updated 5 years ago
- ClickForClickOnce - Generate configurable clickonce payloads☆92Oct 10, 2025Updated 5 months ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- A Rust implementation of the Lamport one-time signature scheme☆15Nov 30, 2022Updated 3 years ago
- Crack md5 hash is a shell script used to decipher and crack MD5 hashes via a wordlist dictionary.☆15Jun 14, 2021Updated 4 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Authenticate a tarball through a signed tag in a git repository (with reproducible builds)☆17May 28, 2022Updated 3 years ago
- A userspace tunnel between two hosts mapping ports on client machine to addresses reachable from server machine.☆17Feb 25, 2022Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- UDP implant☆67Aug 19, 2021Updated 4 years ago