zBreeez3y / EzEnumView external linksLinks
A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines
☆38Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for EzEnum
Users that are interested in EzEnum are comparing it to the libraries listed below
Sorting:
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- PoC for the CVE-2023-49103☆30Dec 2, 2023Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77May 21, 2024Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- ☆39Oct 2, 2021Updated 4 years ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- ☆13Mar 28, 2024Updated last year
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆10Jan 7, 2023Updated 3 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Feb 9, 2026Updated last week
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated last month
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Comprehensive cybersecurity home lab setup that integrates various technologies and configurations to enhance skills in network security,…☆25Oct 15, 2024Updated last year
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago
- Wrapper script for letsencrypt☆11May 27, 2020Updated 5 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- ☆39Jan 12, 2022Updated 4 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- Collections of services for search data from passengers lists and emigrants records☆12Jun 3, 2022Updated 3 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- A barebone model built for detecting weapons in an image. It was built using YOLOv2 (You Only Look Once Algo version2). The model is buil…☆11Jul 23, 2019Updated 6 years ago