ByCh4n / DelebetorLinks
Installs and adjusts Pentest tools.
☆10Updated 3 years ago
Alternatives and similar repositories for Delebetor
Users that are interested in Delebetor are comparing it to the libraries listed below
Sorting:
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆38Updated this week
- ☆28Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- ☆10Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆18Updated 7 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 10 months ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 7 months ago
- VLAN attacks toolkit☆12Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated last month
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- A Simple RedLineStealer☆12Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago