AymanElSherif / RodanLinks
Rodan Exploitation Framework
☆103Updated last month
Alternatives and similar repositories for Rodan
Users that are interested in Rodan are comparing it to the libraries listed below
Sorting:
- Upload files done during my research.☆169Updated last month
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- ☆50Updated 5 years ago
- Attack Surface Discovery Tool☆110Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Updated 3 years ago
- ☆49Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Just another vulnerable web application.☆36Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- ☆102Updated 6 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- OSCP Study Guide☆41Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- Easy to configure Honeypot for Blue Team☆43Updated 7 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Pentesting notes☆18Updated 10 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Web Hacking and Red Teaming MindMap☆78Updated 3 weeks ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- A WLAN red team framework.☆155Updated last year
- A python approach to interacting with web shells.☆30Updated 5 years ago