☆23Jan 18, 2021Updated 5 years ago
Alternatives and similar repositories for autoBOF
Users that are interested in autoBOF are comparing it to the libraries listed below
Sorting:
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆15Dec 18, 2019Updated 6 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Burpsuite HTTP 插件,主要用于内网测试,可定制Content-Type和Response Content☆24Jul 2, 2018Updated 7 years ago
- ☆46May 9, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- 监控公司网站的URL,是否符合预期,如不符发邮件报警☆11Nov 18, 2021Updated 4 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security☆14Nov 26, 2023Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- ecshop rce getshell☆31Dec 5, 2018Updated 7 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Custom checklists, cheatsheets, links, and scripts☆128Jul 19, 2019Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Tor Web Scraper, dnmap CnC, and Forensic Disk Analyzer☆17May 25, 2017Updated 8 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- 平时用到的注入模板☆19Nov 16, 2017Updated 8 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- 黑客神器,谁用谁知道!☆36Jul 10, 2019Updated 6 years ago
- WPA/WPA2 SECURITY HACK WITHOUT BRUTE FORCE☆16Mar 7, 2017Updated 8 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- Record some Vulnerabilities☆44Nov 19, 2022Updated 3 years ago