☆63Mar 21, 2018Updated 8 years ago
Alternatives and similar repositories for firefox_tunnel
Users that are interested in firefox_tunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- SMB Relay Attack Script☆146Dec 6, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆24Aug 11, 2018Updated 7 years ago
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux Memory Cryptographic Keys Extractor☆242May 22, 2023Updated 2 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Joomla Vulnerability Component Scanner☆62Sep 28, 2018Updated 7 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- ☆164May 18, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A WebSocket C2 Tool☆415Nov 24, 2017Updated 8 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- An Advanced Web Crawler and DirBuster☆114Mar 9, 2022Updated 4 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆64Nov 6, 2018Updated 7 years ago
- cobalt strike 自启动脚本☆71Aug 23, 2016Updated 9 years ago