Specify targets and run sets of tools against them
☆11Apr 19, 2015Updated 10 years ago
Alternatives and similar repositories for autopwn
Users that are interested in autopwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated last month
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16May 13, 2018Updated 7 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Generate HTTPS reports based on scan data☆15Updated this week
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- mirror of☆11Apr 4, 2018Updated 7 years ago
- Dr. Jekyll's Themes - Static Website Theme Directory☆15Aug 27, 2023Updated 2 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 📊 A small tool for displaying the WiFi traffic around you in the terminal.☆18Nov 3, 2019Updated 6 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- A framework for automating penetration testing using a plugin based architecture☆42May 20, 2022Updated 3 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago