ByCh4n / DelebetorLinks
Installs and adjusts Pentest tools.
☆10Updated 3 years ago
Alternatives and similar repositories for Delebetor
Users that are interested in Delebetor are comparing it to the libraries listed below
Sorting:
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- Collection of extra pentest tools for Kali Linux☆112Updated 2 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Updated last year
- Bash script to generate reverse shell payloads☆19Updated 2 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated 2 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 weeks ago
- VLAN attacks toolkit☆12Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated 2 years ago
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆18Updated 7 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- This repo for making it easy to transfer files on the OSCP exam using FTP,PUT,SMB,GET☆19Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- ☆28Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- ☆47Updated 3 years ago
- ☆12Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago