AlanFoster / toolbox
CTF toolbox
☆22Updated last year
Alternatives and similar repositories for toolbox:
Users that are interested in toolbox are comparing it to the libraries listed below
- Generate common Reverse Shells for Pentesting☆40Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- ☆20Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆93Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆30Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 3 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆50Updated last year
- ☆120Updated last year
- ☆42Updated last year
- Zero-Day Code Injection and Persistence Technique☆33Updated 7 years ago
- A public, open source physical security methodology☆44Updated 10 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 8 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆55Updated 2 years ago
- Notes and resources for the AD☆11Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆193Updated last week
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆104Updated last year
- List of Command&Control (C2) software☆34Updated 2 years ago
- X-Platform bind shell in TypeScript!☆28Updated last year
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆55Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- ☆34Updated 3 years ago
- ☆16Updated 3 years ago
- Simple HTTP listener for security testing☆113Updated 2 months ago