Eplox / evadorLinks
IDS/IPS malware download evasion
☆15Updated 6 years ago
Alternatives and similar repositories for evador
Users that are interested in evador are comparing it to the libraries listed below
Sorting:
- Useful Windows and AD tools☆15Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 7 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- ☆21Updated 5 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- yet another dirbuster☆19Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- ☆38Updated 5 years ago