AlanFoster / toolbox
CTF toolbox
☆22Updated 2 years ago
Alternatives and similar repositories for toolbox:
Users that are interested in toolbox are comparing it to the libraries listed below
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- A public, open source physical security methodology☆45Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- ☆20Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- ☆42Updated last year
- My Favorite Offensive Security Scripts☆70Updated last year
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- ☆121Updated last year
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- X-Platform bind shell in TypeScript!☆28Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆39Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆33Updated last month
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- ☆16Updated 4 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- A toolkit for your red team operations☆25Updated 3 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated 2 years ago
- ☆137Updated last year
- ☆35Updated 3 years ago
- Generate graphs and charts based on password cracking result☆160Updated 2 years ago
- ☆41Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- ☆64Updated last year