CyberMonitor / defcon-26-Packet-Hacking-VillageLinks
☆12Updated 6 years ago
Alternatives and similar repositories for defcon-26-Packet-Hacking-Village
Users that are interested in defcon-26-Packet-Hacking-Village are comparing it to the libraries listed below
Sorting:
- Python Remote Administration Tool☆13Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- ☆13Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Self contained htaccess shells and attacks☆14Updated 7 years ago
- Suite for Information gathering☆12Updated 6 years ago
- MS17-010☆12Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago