A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines
☆38Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for EzEnum
Users that are interested in EzEnum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AWS audits, without screenshots☆29Updated this week
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- ☆55Jun 18, 2023Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- MayorSec DNS Enumeration Tool☆91Nov 30, 2024Updated last year
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 4 years ago
- ☆17Jul 17, 2023Updated 2 years ago
- This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, …☆53Mar 29, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- Nagios XI 5.5.6 Remote Code Execution and Privilege Escalation☆14Aug 14, 2020Updated 5 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Nov 20, 2022Updated 3 years ago
- A template for documenting penetration tests with OneNote.☆21Feb 15, 2020Updated 6 years ago
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Documentation of vmc☆16Mar 4, 2025Updated last year
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Jul 23, 2020Updated 5 years ago
- Pwnspoof repository☆265Sep 8, 2023Updated 2 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- List Security Guide☆19Feb 24, 2021Updated 5 years ago
- Class materials for DevSecOps Live Lesson☆15Jun 19, 2022Updated 3 years ago
- PoC for the CVE-2023-49103☆30Dec 2, 2023Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Scanner for Gitlab Security Mis-Configurations☆18Apr 16, 2023Updated 2 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Jan 5, 2021Updated 5 years ago
- Ideas on how to quickly learn to build command-line tools☆11Feb 26, 2022Updated 4 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 13, 2026Updated last week
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago