0x90n / toolsetLinks
☆12Updated 5 years ago
Alternatives and similar repositories for toolset
Users that are interested in toolset are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Updated 5 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 4 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 4 years ago
- A collection of personal ZAP scripts☆13Updated 2 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Standardizing Security Titles☆13Updated last month
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 3 weeks ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Recordization library☆11Updated 2 weeks ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Provides access to libhashcat☆31Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago