A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phishing campaigns, extrapolate hidden data such as subdomains, security identifers, usernames and encrypted passwords; utilise pass the hash techniques, crack and auto import ntds.dit files, create on-demand golde…
☆16Apr 10, 2026Updated this week
Alternatives and similar repositories for ROGUE-AGENT
Users that are interested in ROGUE-AGENT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- ☆36Oct 6, 2021Updated 4 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Sep 19, 2019Updated 6 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Mar 9, 2023Updated 3 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46May 3, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Mar 9, 2023Updated 3 years ago
- Proof of Concepts of vulnerabilities discovered by me☆11Jan 24, 2024Updated 2 years ago
- Open browser window and set proxy☆12Oct 13, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆11Mar 7, 2021Updated 5 years ago
- Create your own powershell, malware desktop app or even clickjacking web with a single command for unix and windows systems.☆17May 26, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Mar 4, 2021Updated 5 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- ☆22Mar 5, 2018Updated 8 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago
- Send controlled amount of bytes, send msf-pattern, calculate offset, custom buffer, badcharacters all in one.☆15Apr 20, 2024Updated last year
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Set system proxy for mac and windows platform.☆14Apr 4, 2020Updated 6 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆28Apr 4, 2023Updated 3 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- Provides an Invoice Payment Gateway, mainly for B2B segment where instant payment via PayPal etc. is not a viable option.☆12Apr 7, 2014Updated 12 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- GPT fdisk partitioning tool for use under UEFI environments.☆17Nov 27, 2024Updated last year