Athena-OS / athena-repository
☆19Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for athena-repository
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆15Updated 3 months ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆16Updated 11 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 7 months ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- The Network Execution Tool☆13Updated 7 months ago
- Pull Hashes Decryption From Online Sources Using Python☆15Updated 4 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆45Updated 6 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆24Updated 8 months ago
- Breaking Active Directory Security with 🍞☆23Updated last month
- Python TCP server for terminal rickrolls☆11Updated 2 years ago
- Field guide to gather low-hanging fruits☆13Updated 8 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆26Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated last month
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆13Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆38Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆33Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- Modular framework to exploit UPS devices☆61Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆15Updated 3 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Updated last year
- An offensive security framework for writing payloads☆15Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- Visualize BBOT scans in realtime with VivaGraphJS☆22Updated this week
- Automatic reverse/bind shell generator cheat sheet.☆35Updated last year
- Python Penetration Testing Tools☆17Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆13Updated 3 months ago