Genaro-Chris / Sudo-Stealer
☆11Updated 2 years ago
Alternatives and similar repositories for Sudo-Stealer:
Users that are interested in Sudo-Stealer are comparing it to the libraries listed below
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 7 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 2 weeks ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆12Updated 2 years ago
- Burp suite Certificate modification tool☆18Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ☆24Updated last year
- ☆12Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated last year
- An exotic service bruteforce tool.☆12Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆13Updated last week
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Updated 2 months ago
- Another vulnerability scanner☆19Updated 3 weeks ago
- Command and Control Framework☆13Updated last year
- A C# Tool to gather information about email breaches☆14Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated last year
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago