FlatL1neAPT / Red-Team-softLinks
☆18Updated 7 years ago
Alternatives and similar repositories for Red-Team-soft
Users that are interested in Red-Team-soft are comparing it to the libraries listed below
Sorting:
- ☆18Updated 7 years ago
- ☆39Updated 7 years ago
- Payload encoder for bypass WAF☆17Updated 5 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- WAF Exploitation Framework☆13Updated last year
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- Executables that execute other stuff☆52Updated 7 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆37Updated 6 years ago
- Aggressor scripts for Cobalt Strike☆57Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- NmapPy - Python implementation of Nmap☆36Updated 6 years ago
- ☆11Updated 6 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Updated 6 years ago
- ☆29Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- My Shellcode Archive☆28Updated 8 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- ☆17Updated 7 years ago
- ☆20Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Burp Suite extension to help make Graphql request more readable☆31Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago