Lists (32)
Sort Name ascending (A-Z)
AD Certificate Services (ADCS)
3 repositories
Blockchain
1 repository
Bug Bounty
1 repository
Capture The Flag (CTF)
1 repository
Conference Materials
2 repositories
Crypto Attacks
1 repository
CTF
1 repository
CVE
14 repositories
Entra ID (Azure AD)
6 repositories
IOS
7 repositories
Lang-Go
2 repositories
Language-Go
4 repositories
Learning
4 repositories
Mainframe
4 repositories
NewGen Unix CLI Tools
5 repositories
OSINT
2 repositories
pwn
4 repositories
Radio Frequency
1 repository
Remote Procedure Calls (RPC)
7 repositories
Research
33 repositories
Reverse Engineering
5 repositories
SMB
1 repository
Steganography
2 repositories
Synthesizers
1 repository
Trainings
1 repository
Virtualization
1 repository
Web
38 repositories
Web shells
1 repository
Windows Active Directory
49 repositories
Windows exploitation
31 repositories
Windows Post-Exploitation
4 repositories
Wordlists
2 repositories
Stars
4
results
for sponsorable starred repositories
written in Shell
Clear filter
Self contained htaccess shells and attacks
Hydra wrapper for bruteforcing Microsoft Outlook Web Application.
Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.
WAV to MMV converter. You can then use the MMV file in input of MSSTV to decode Slow Scan Television (SSTV) sound signals.