1d8 / trojan
☆85Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for trojan
- A polyglot payload generator☆239Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 3 years ago
- Quick and dirty scripts for pentesting.☆40Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆59Updated 3 years ago
- Linux Cheat Sheet☆119Updated 4 years ago
- A Linux enumeration script for Hack The Box☆187Updated 4 years ago
- Python template to assist with buffer overflows☆70Updated 4 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆278Updated last week
- Yet Another Sniffer for monitoring network traffic☆84Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- internet monitoring osint telegram bot for windows☆145Updated last year
- Collection of pentesting scripts☆429Updated 2 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆298Updated 4 months ago
- Post exploitation helper☆37Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆81Updated 2 years ago
- Violent Python scripts used in book and few other required files☆91Updated 5 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 3 years ago
- A collection of personal scripts used in hacking excercises.☆147Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆208Updated 3 years ago
- OSCP cheet sheet☆196Updated 4 years ago
- OSCP All Tools are Here ...!! ***☆1Updated 4 years ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆54Updated 4 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆103Updated 5 years ago
- ☆165Updated last year