Etisalat-Egypt / RodanLinks
Rodan Exploitation Framework
☆102Updated 3 years ago
Alternatives and similar repositories for Rodan
Users that are interested in Rodan are comparing it to the libraries listed below
Sorting:
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Upload files done during my research.☆166Updated 6 months ago
- Pentest stuff☆49Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- OSWE Preparation☆37Updated 6 years ago
- ☆49Updated 5 years ago
- ☆104Updated 5 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- ☆49Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 4 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- ☆51Updated 8 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- A WLAN red team framework.☆155Updated last year
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- ☆120Updated 3 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 2 months ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago