BlackArch / amapLinks
[Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.
☆14Updated 11 years ago
Alternatives and similar repositories for amap
Users that are interested in amap are comparing it to the libraries listed below
Sorting:
- module for certexfil☆15Updated 2 years ago
- ☆22Updated last year
- C & Shellcode Playground..☆11Updated 7 years ago
- ☆13Updated 10 years ago
- Burp Suite Pro extension☆10Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 7 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- ☆17Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- DHCP attack tool☆20Updated 8 months ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago