CyberSecurityUP / C2Matrix-Automation
C2Matrix Automation
☆11Updated last year
Alternatives and similar repositories for C2Matrix-Automation
Users that are interested in C2Matrix-Automation are comparing it to the libraries listed below
Sorting:
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- ☆25Updated last year
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆37Updated 2 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆14Updated 3 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Field guide to gather low-hanging fruits☆13Updated last month
- Pentesting notes☆17Updated 2 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Template Nuclei SSTI☆29Updated last year
- Simple recon tool automates your recon process☆17Updated 2 years ago
- ☆29Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- Red Team Server (RTS)☆16Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- This is working POC of CVE-2022-36271☆9Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 2 months ago