CTF toolbox
☆22Apr 2, 2023Updated 2 years ago
Alternatives and similar repositories for toolbox
Users that are interested in toolbox are comparing it to the libraries listed below
Sorting:
- ☆17Dec 16, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Generate common Reverse Shells for Pentesting☆44May 23, 2021Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Create custom connections in your profile on Discord☆63Aug 2, 2021Updated 4 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- The best interview questions ever☆10Jan 27, 2024Updated 2 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆56Nov 18, 2021Updated 4 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- ☆18Jun 12, 2025Updated 8 months ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- Xfinity / Comcast Wordlist Generator☆78Mar 24, 2023Updated 2 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- phishing using wifi method - create fake wifi to dump social media password☆21Apr 17, 2025Updated 10 months ago
- Rest API for bypassing Mojang's API ratelimits☆11Sep 24, 2019Updated 6 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆22Jul 1, 2021Updated 4 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆22Jun 30, 2024Updated last year
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Simple java framework like ORM to build sql requests, based on annotations.☆24Sep 5, 2020Updated 5 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Automate installation of extra pentest tools on Kali Linux☆62Apr 18, 2021Updated 4 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago