Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.
☆14Aug 22, 2021Updated 4 years ago
Alternatives and similar repositories for gitosint
Users that are interested in gitosint are comparing it to the libraries listed below
Sorting:
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- ☆15Apr 20, 2022Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- A method for building LinuxKit images for Docker-CE with custom kernels.☆21Aug 3, 2023Updated 2 years ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- 地狱犬系统:无埋点、自动织入插桩,用于监控Andorid系统中各种行为,包括页面、控件、以及方法(函数)、指令级别的劫持和注入,实现监控☆10May 12, 2021Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- ☆153Mar 26, 2025Updated 11 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- New phishing tool with 30+ templates updated tool☆10Feb 2, 2024Updated 2 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- CyberSniff Desktop Client☆18Jul 13, 2022Updated 3 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month