AmirHoseinTangsiriNET / NetKnife
Intrusion Testing And Intra-Network Attacks Framework
☆8Updated 4 years ago
Alternatives and similar repositories for NetKnife
Users that are interested in NetKnife are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 months ago
- my write-ups for flareon7☆27Updated 4 years ago
- log4jshell vulnerability scanner for bug bounty☆23Updated 3 years ago
- Obfuscate UDP traffic as RTP☆19Updated last year
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 9 months ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆10Updated 3 years ago
- Framework for generating audit commands for Unix security audits☆66Updated last year
- Dorsa Lab Vulnerable Web Application☆21Updated 2 years ago
- Recon (Whois)☆15Updated last year
- Xegtor - Network Attack And Scanning Tool☆24Updated 2 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Updated 6 years ago
- A Simple tool to execute shellcode with the ability to detect mouse movement☆12Updated 4 years ago
- ☆15Updated 3 years ago
- The reverse shell client is a Python based alternative for a netcat reverse shell listener☆18Updated 9 years ago
- A host based IDS written in C# Targetted at Metasploit☆44Updated 11 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- lightweight http redirector written in nim☆11Updated 2 years ago
- this script helps you to delete your tweets and likes from your tweeter account☆15Updated 11 months ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆20Updated 3 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆10Updated 4 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 7 years ago
- parsers to make life easier☆13Updated 4 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago