0sm0s1z / wopr
☆11Updated 7 years ago
Alternatives and similar repositories for wopr:
Users that are interested in wopr are comparing it to the libraries listed below
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- ☆46Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- ☆11Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- EmPyre Web Interface☆12Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- ☆14Updated 7 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 3 months ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- ☆12Updated 11 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago