☆23Jan 18, 2021Updated 5 years ago
Alternatives and similar repositories for autoBOF
Users that are interested in autoBOF are comparing it to the libraries listed below
Sorting:
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- ☆15Dec 18, 2019Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Custom checklists, cheatsheets, links, and scripts☆127Jul 19, 2019Updated 6 years ago
- OSCP Buffer Overflow in 30 minutes☆37Jun 12, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Burpsuite HTTP 插件,主要用于内网测试,可定制Content-Type和Response Content☆24Jul 2, 2018Updated 7 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- ☆46May 9, 2017Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- 监控公司网站的URL,是否符合预期,如不符发邮件报警☆11Nov 18, 2021Updated 4 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Oct 11, 2020Updated 5 years ago
- ecshop rce getshell☆31Dec 5, 2018Updated 7 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago