D4Vinci / One-Lin3rLinks
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
☆1,726Updated 10 months ago
Alternatives and similar repositories for One-Lin3r
Users that are interested in One-Lin3r are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,753Updated 7 months ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆634Updated last month
- Find exploits in local and online databases instantly☆1,754Updated 3 years ago
- Red Team Tool Kit☆1,123Updated 2 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,170Updated 2 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,064Updated last year
- offsec batteries included☆1,576Updated last year
- Pop shells like a master.☆1,472Updated 6 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,837Updated 2 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆979Updated 7 years ago
- Undetectable Windows Payload Generation☆1,604Updated 2 years ago
- MSFvenom Payload Creator (MSFPC)☆1,281Updated 4 years ago
- collection of articles/books about programing☆578Updated last year
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆896Updated 2 weeks ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,720Updated 9 months ago
- A default credential scanner.☆1,493Updated last month
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,909Updated 2 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆641Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,122Updated 5 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,285Updated 2 weeks ago
- The Shadow Attack Framework☆1,117Updated 3 years ago
- Mass scan IPs for vulnerable services☆1,037Updated 3 years ago
- Python antivirus evasion tool☆1,443Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,295Updated 3 years ago
- 🔎 shodansploit > v1.3.0☆537Updated 2 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,708Updated 9 months ago
- Email recon made fast and easy, with a framework to build on☆957Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,423Updated 6 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,492Updated last year
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆407Updated 2 years ago