CTF toolbox
☆23Apr 2, 2023Updated 3 years ago
Alternatives and similar repositories for toolbox
Users that are interested in toolbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Dec 16, 2021Updated 4 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆57Nov 18, 2021Updated 4 years ago
- Create custom connections in your profile on Discord☆63Aug 2, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆44May 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Automate installation of extra pentest tools on Kali Linux☆63Apr 18, 2021Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆55Jan 25, 2022Updated 4 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Piso wifi vendo trolling tool☆15Dec 14, 2023Updated 2 years ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Pi Guide from installation to usage and updates☆10Feb 11, 2025Updated last year
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- A Python API for Hack the Box platform interaction☆64Nov 27, 2020Updated 5 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- A terminal user interface for searching google☆11Mar 19, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12May 25, 2022Updated 3 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Mar 26, 2021Updated 5 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- phishing using wifi method - create fake wifi to dump social media password☆22Apr 17, 2025Updated 11 months ago
- ☆121Sep 13, 2023Updated 2 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Just some flipper zero scripts☆14Sep 3, 2022Updated 3 years ago