GhostTroops / shallot_eschalotLinks
create customized .onion addresses for your hidden service,make shallot and eschalot tools
☆13Updated 3 years ago
Alternatives and similar repositories for shallot_eschalot
Users that are interested in shallot_eschalot are comparing it to the libraries listed below
Sorting:
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Red Team C2 and Post Exploitation code☆37Updated last month
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- ☆17Updated 7 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- ☆17Updated 3 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- Aurora Remote Administration Tool☆20Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆18Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- A Linux RAT in C☆35Updated 6 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 8 months ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Free Email Providers☆11Updated 2 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago
- Magento Security Scanner☆15Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 8 years ago