CPester05 / ToolBar
Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)
☆12Updated last year
Alternatives and similar repositories for ToolBar:
Users that are interested in ToolBar are comparing it to the libraries listed below
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- List of Command&Control (C2) software☆34Updated 2 years ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆16Updated last year
- ☆34Updated 3 years ago
- ☆11Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- ☆11Updated 4 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Windows priviledge escalation script☆13Updated last month
- Command line client for HackTheBox☆22Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 3 weeks ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆24Updated 8 months ago
- ☆34Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Field guide to gather low-hanging fruits☆13Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- ☆42Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated last year
- Tools used for Pentesting☆22Updated last year
- Red Teaming tools and techniques☆50Updated 2 years ago
- ☆36Updated 2 months ago
- ☆31Updated 2 years ago