0sm0s1z / wopr
☆11Updated 7 years ago
Alternatives and similar repositories for wopr:
Users that are interested in wopr are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- ☆46Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- EmPyre Web Interface☆12Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆45Updated 4 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- ☆11Updated 7 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- AV Bypass☆29Updated 7 years ago