☆12Oct 16, 2017Updated 8 years ago
Alternatives and similar repositories for FtpSheller
Users that are interested in FtpSheller are comparing it to the libraries listed below
Sorting:
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Feb 22, 2026Updated last week
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- ☆13May 9, 2017Updated 8 years ago
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago