Charliedean / NetcatUPLinks
Upgrade your netcat shell today!
☆60Updated 7 years ago
Alternatives and similar repositories for NetcatUP
Users that are interested in NetcatUP are comparing it to the libraries listed below
Sorting:
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- unix wildcard attacks☆133Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Domain fronting using Google app engine☆52Updated 7 years ago
- ☆101Updated 7 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆71Updated 8 years ago
- ☆34Updated 8 years ago
- Splunk Web Shell☆51Updated 10 years ago
- ☆52Updated 11 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 8 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆83Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- Avoidz tool to bypass most A.V softwares☆138Updated 7 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- A collection of hashcat-hcstat files☆31Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago