BlackArch / amap
[Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.
☆14Updated 11 years ago
Alternatives and similar repositories for amap:
Users that are interested in amap are comparing it to the libraries listed below
- ☆13Updated 10 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated last month
- Random Tips and Writeups.☆13Updated 6 years ago
- Seven different DLL injection techniques in one single project.☆11Updated 4 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- visually see issues with supported cipher suites☆16Updated 10 months ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago