BlackArch / amapLinks
[Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.
☆15Updated 12 years ago
Alternatives and similar repositories for amap
Users that are interested in amap are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Local Privilege Escalation Miner☆32Updated 3 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Updated 6 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Vulnserver exploits☆15Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 9 years ago
- Left To My Own Devices - NT hash tools☆40Updated 3 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- PAM Backdoor☆32Updated 2 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- Escaping Restricted Environments and Bypassing DLP☆77Updated 7 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Free Email Providers☆11Updated 2 years ago