HarmJ0y / cortanaView external linksLinks
This is a pack of Cortana scripts commonly used on our pentests.
☆70Nov 25, 2014Updated 11 years ago
Alternatives and similar repositories for cortana
Users that are interested in cortana are comparing it to the libraries listed below
Sorting:
- ☆23Feb 16, 2016Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆459Mar 2, 2021Updated 4 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 10 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- Powershell MS Outlook enumeration and phishing tool☆77May 26, 2016Updated 9 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Cheat sheets for various projects.☆1,085Oct 16, 2017Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- ☆12Aug 29, 2025Updated 5 months ago