EntySec / Checkmate
Powerful advanced web platform for C2 managing and automated penetration testing.
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Checkmate
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Burp suite Certificate modification tool☆17Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Another vulnerability scanner☆17Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆12Updated 7 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated last year
- Simple script to bulk check if IPs match networks☆11Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- ☆13Updated last year
- Various scripts & tools☆11Updated 7 months ago
- WebHook for Red Team☆24Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆10Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 2 years ago
- Python script to tamper with pages to test for Log4J Shell vulnerability.☆13Updated 2 weeks ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year