1d8 / trojan
☆87Updated 4 years ago
Alternatives and similar repositories for trojan:
Users that are interested in trojan are comparing it to the libraries listed below
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- A polyglot payload generator☆239Updated 2 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆61Updated 3 years ago
- Post exploitation helper☆37Updated last year
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Python template to assist with buffer overflows☆70Updated 5 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆299Updated 7 months ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 3 years ago
- internet monitoring osint telegram bot for windows☆148Updated last year
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- This Script installs useful tools and stuff for pen-testing purpose.☆35Updated 4 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆109Updated 4 years ago
- Quick and dirty scripts for pentesting.☆40Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆54Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- Violent Python scripts used in book and few other required files☆92Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆282Updated last month
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆100Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆84Updated 3 years ago
- ☆167Updated last year
- Custom exploits that I made for Hack The Box machines!☆37Updated 3 years ago