01rabbit / PAKURI-THONLinks
PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication server). PAKURI-THON can perform most of the operations with intuitive web operations and commands to chatbots.
β27Updated 3 years ago
Alternatives and similar repositories for PAKURI-THON
Users that are interested in PAKURI-THON are comparing it to the libraries listed below
Sorting:
- π» [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)β24Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- web application pentesting tools for dockerβ18Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.β50Updated last year
- β12Updated 3 years ago
- Automate Auxiliary Module in Metasploitβ18Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- β10Updated 3 years ago
- DNSrecon tool with GUI for Kali Linuxβ60Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).β54Updated 3 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 4 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etcβ18Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β21Updated 2 years ago
- Bash script for CTF automating basic enumerationβ43Updated 3 years ago
- Simple recon tool automates your recon processβ17Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scannerβ16Updated 4 years ago
- PassMute - A multi featured Password Transmutation/Mutator Toolβ53Updated 2 years ago
- β25Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β63Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β21Updated 3 years ago
- A BASH Script to automate the installation of the most popular bug bounty toolsβ21Updated last year
- Enumerate AWS cloud resources based on provided credentialβ51Updated 3 years ago
- A tool for steganography of png files .β24Updated 3 years ago
- Enumeration & fingerprint toolβ24Updated last year
- C2Matrix Automationβ13Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applicaβ¦β22Updated 5 months ago
- Automated HTTP Request Repeating With Burp Suiteβ40Updated 2 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themβ18Updated 4 years ago