CTF toolbox
☆23Apr 2, 2023Updated 3 years ago
Alternatives and similar repositories for toolbox
Users that are interested in toolbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆57Nov 18, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆21Oct 7, 2022Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆45May 23, 2021Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆79Mar 24, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 9 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- 🤖 The Modern Port Scanner 🤖☆23Jul 1, 2021Updated 4 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆56Jan 25, 2022Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Rest API for bypassing Mojang's API ratelimits☆11Sep 24, 2019Updated 6 years ago
- Piso wifi vendo trolling tool☆15Dec 14, 2023Updated 2 years ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- A Python API for Hack the Box platform interaction☆64Nov 27, 2020Updated 5 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12May 25, 2022Updated 3 years ago
- phishing using wifi method - create fake wifi to dump social media password☆22Apr 17, 2025Updated last year
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Snake 🐍 on the Dreamcast Memory Card (VMS) peripheral device☆16Mar 5, 2026Updated last month
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago