Specify targets and run sets of tools against them
☆11Apr 19, 2015Updated 11 years ago
Alternatives and similar repositories for autopwn
Users that are interested in autopwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automated pshtt, trustymail, and sslyze scanning☆30Apr 24, 2026Updated 2 weeks ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16May 13, 2018Updated 7 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 12 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 7 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Uses the Arduino Uno microcontroller to emulate a USB keyboard and insert random text into the computer at random intervals☆10Apr 9, 2026Updated 3 weeks ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Mar 26, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Apr 14, 2021Updated 5 years ago
- mirror of☆11Apr 4, 2018Updated 8 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 7 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 11 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- 📊 A small tool for displaying the WiFi traffic around you in the terminal.☆18Nov 3, 2019Updated 6 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- A framework for automating penetration testing using a plugin based architecture☆42May 20, 2022Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago