CTF toolbox
☆23Apr 2, 2023Updated 2 years ago
Alternatives and similar repositories for toolbox
Users that are interested in toolbox are comparing it to the libraries listed below
Sorting:
- ☆17Dec 16, 2021Updated 4 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆56Nov 18, 2021Updated 4 years ago
- Create custom connections in your profile on Discord☆63Aug 2, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆44May 23, 2021Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆78Mar 24, 2023Updated 2 years ago
- Zero-Day Code Injection and Persistence Technique☆35Mar 28, 2017Updated 8 years ago
- Automate installation of extra pentest tools on Kali Linux☆61Apr 18, 2021Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- ☆18Jun 12, 2025Updated 9 months ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- 🤖 The Modern Port Scanner 🤖☆22Jul 1, 2021Updated 4 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆55Jan 25, 2022Updated 4 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 3 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- A Python API for Hack the Box platform interaction☆64Nov 27, 2020Updated 5 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- ☆12May 25, 2022Updated 3 years ago
- phishing using wifi method - create fake wifi to dump social media password☆21Apr 17, 2025Updated 11 months ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Aug 25, 2024Updated last year
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Just some flipper zero scripts☆14Sep 3, 2022Updated 3 years ago
- tiny fmt utility☆39Oct 14, 2014Updated 11 years ago