Lists (13)
Sort Name ascending (A-Z)
Stars
The Elastic stack (ELK) powered by Docker and Compose.
web interface (UI) for configuring and managing tac_plus-ng
Software to automate the management and configuration of infrastructure and applications at scale.
Tài liệu đề cập ở Kênh https://www.youtube.com/@NetworkThucChien
ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)
Python wrapper for tshark, allowing python packet parsing using wireshark dissectors
This repository contains some resources for ethical hackers penetration tester 😊 This may contain some files, tools, books, and links that need to be used for good purposes only. Do not do any ille…
Hack Night is an open weekly training session run by the OSIRIS lab.
Configure Switch Interface, Show ARP, MAC Address, IP Address
A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
A DNS meta-query spider that enumerates DNS records, and subdomains.
A DNS reconnaissance tool for locating non-contiguous IP space.
Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
Medusa is a speedy, parallel, and modular, login brute-forcer.
A tool to dump the login password from the current linux user
TextFSM templates for parsing show commands of network devices
A tool to dump a git repository from a website
A repository with 3 tools for pwn'ing websites with .git repositories available
Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
Kernel mode WinDbg extension and PoCs for token privilege investigation.
getsystem via parent process using ps1 & embeded c#