51x / WHP
Micro$oft Windows Hacking Pack
☆512Updated 6 years ago
Related projects: ⓘ
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆721Updated 6 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆956Updated 6 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆511Updated 4 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆500Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,095Updated 6 years ago
- ☆518Updated this week
- Post Exploitation Wiki☆507Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,199Updated 4 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆548Updated 9 years ago
- Tricks for penetration testing☆567Updated 3 years ago
- Exploits and Security Tools Framework 2.0.1☆303Updated 2 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆732Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆263Updated 9 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆627Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,046Updated 4 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆423Updated 4 years ago
- Github for the scripts utilised during Penetration test☆233Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,118Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆554Updated 4 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆515Updated last year
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆485Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆550Updated 3 months ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- Powershell C2 Server and Implants☆573Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆391Updated 2 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 6 years ago
- A WebSocket C2 Tool☆380Updated 6 years ago
- Plugins for Metasploit Framework☆421Updated 5 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆390Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆524Updated 3 years ago