BlackDiverX / cqtoolsLinks
Unpacked tools of CQAcademy
☆110Updated 6 years ago
Alternatives and similar repositories for cqtools
Users that are interested in cqtools are comparing it to the libraries listed below
Sorting:
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆43Updated last month
- WireBug is a toolset for Voice-over-IP penetration testing☆170Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆175Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 5 years ago
- PowerShell payload generator☆117Updated 4 years ago
- A WLAN red team framework.☆154Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated 2 weeks ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A collection of tools created for computer security research purposes.☆133Updated 5 years ago
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- ☆154Updated 2 weeks ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆63Updated 5 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- Low Interaction Mobile Honeypot☆95Updated 5 months ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆33Updated 9 months ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- brute force SSH public-key authentication☆78Updated 6 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- CLI Frontend for PowerShell Empire.☆49Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- handy powershell scripts☆65Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago