ElevenPaths / PESTOLinks
☆26Updated 5 years ago
Alternatives and similar repositories for PESTO
Users that are interested in PESTO are comparing it to the libraries listed below
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Communicate with a remote shell easily☆12Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆17Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 7 months ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- ☆11Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- ☆11Updated 7 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Horizontal Brute Forcing tool for OWA☆9Updated 7 years ago
- ☆10Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- ☆11Updated 6 years ago