HassanShehata / KeySpark
Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
☆43Updated 4 years ago
Alternatives and similar repositories for KeySpark:
Users that are interested in KeySpark are comparing it to the libraries listed below
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Simple Karma Attack☆67Updated 4 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆64Updated 5 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆19Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆64Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆117Updated 8 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- Backdoor en powershell vía Telegram☆30Updated 7 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆49Updated last month
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Terribad PrivEsc enumeration script for Windows systems☆14Updated 4 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- ☆13Updated 7 years ago
- HTTP botnet☆59Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Reconnaissance tool for Microsoft Office 365☆67Updated 6 years ago
- One line PS scripts that may come handy during your network assesment☆77Updated 4 years ago
- ☆13Updated last year