AlanFoster / toolbox
CTF toolbox
☆22Updated 2 years ago
Alternatives and similar repositories for toolbox:
Users that are interested in toolbox are comparing it to the libraries listed below
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- ☆20Updated 3 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆39Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated last year
- Directory/File, DNS and VHost busting tool written in Go☆20Updated 5 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆55Updated 3 years ago
- ☆121Updated last year
- Exploit code for CVE-2019-17662☆16Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 3 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated 2 years ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- A little cheatsheet for NetExec☆22Updated 11 months ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 9 months ago
- My Favorite Offensive Security Scripts☆69Updated last year
- ☆41Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 9 months ago
- A toolkit for your red team operations☆25Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- ☆42Updated last year
- ☆34Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆41Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆30Updated last year