Etisalat-Egypt / RodanLinks
Rodan Exploitation Framework
☆100Updated 3 years ago
Alternatives and similar repositories for Rodan
Users that are interested in Rodan are comparing it to the libraries listed below
Sorting:
- Attack Surface Discovery Tool☆108Updated 8 months ago
- ☆46Updated 4 years ago
- ☆48Updated 4 years ago
- Web Hacking and Red Teaming MindMap☆73Updated 2 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆47Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- ☆94Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- ☆53Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- A powerful static analysis tool that uses AI to scan Android APK files for security vulnerabilities and potential issues. The scanner dec…☆19Updated 2 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A multi web security purposes tool☆39Updated 3 weeks ago
- Creates and sends fake meeting invite☆61Updated 4 years ago
- ☆104Updated 5 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 4 months ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 7 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 5 months ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated 2 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆52Updated 2 weeks ago
- Windows for Red Teamers☆126Updated 3 years ago
- Bash script for CTF automating basic enumeration☆44Updated 3 years ago
- ☆52Updated 2 years ago