BlackArch / amapLinks
[Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.
☆15Updated 12 years ago
Alternatives and similar repositories for amap
Users that are interested in amap are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 6 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 8 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- A Linux RAT in C☆34Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Automated install process for Phishing Frenzy☆23Updated 11 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆15Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago