BuffaloWill / gatling_gun
Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for bypassing/slowing down IP based IDS/IPS.
☆13Updated 9 years ago
Related projects: ⓘ
- firewall port testing tool☆12Updated 6 years ago
- ☆18Updated this week
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Gmail Knocker☆21Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Tools for use with phishing frenzy☆11Updated 5 years ago
- PHP Phishing Framework☆27Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 3 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Educational Python penetration testing framework☆10Updated 6 years ago
- Shovels a shell back to you on a specified port☆9Updated 3 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 8 years ago
- ☆13Updated this week
- Collection of Nmap scripts☆10Updated 8 years ago
- ☆17Updated this week
- Search bing with python☆11Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Metasploit exploit suggester using OpenVAS XML output☆17Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- ☆10Updated this week
- ☆16Updated this week
- collection of useful shells for penetration tests☆36Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- Recon tool using Yatedo and Pipl☆9Updated 9 years ago