CyberSecurityUP / FuxsocietyLinks
Fuxsociety Mr Robot 2.1
☆27Updated 2 years ago
Alternatives and similar repositories for Fuxsociety
Users that are interested in Fuxsociety are comparing it to the libraries listed below
Sorting:
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆45Updated 3 years ago
- Challenge Python☆19Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Automatic cloud backup of Kali Linux data☆12Updated 5 years ago
- Enumeration & fingerprint tool☆24Updated last year
- ☆65Updated 2 years ago
- ☆19Updated 4 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Updated last year
- Ransomware groups posts☆42Updated this week
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- ☆31Updated 4 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆27Updated 3 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆22Updated 5 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 5 months ago