1d8 / trojanLinks
☆86Updated 5 years ago
Alternatives and similar repositories for trojan
Users that are interested in trojan are comparing it to the libraries listed below
Sorting:
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 4 years ago
- A polyglot payload generator☆244Updated 3 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago
- Python template to assist with buffer overflows☆72Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆287Updated 7 months ago
- ☆168Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆305Updated last year
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Repo for the Gitbook Practical Hacking☆103Updated 6 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆233Updated 5 years ago
- ☆155Updated 8 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Custom checklists, cheatsheets, links, and scripts☆126Updated 6 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆217Updated 5 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- internet monitoring osint telegram bot for windows☆156Updated 2 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆126Updated 2 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 4 years ago
- This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for…☆220Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆77Updated 5 years ago
- Collection of different exploits☆181Updated 4 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 6 months ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago
- Collection of pentesting scripts☆440Updated 3 years ago
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago