HassanShehata / KeySpark
Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
☆43Updated 4 years ago
Alternatives and similar repositories for KeySpark:
Users that are interested in KeySpark are comparing it to the libraries listed below
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Simple Karma Attack☆67Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- ☆60Updated 7 years ago
- ☆24Updated 5 years ago
- ☆51Updated 4 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- ☆14Updated last year
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- ☆13Updated 7 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 5 years ago
- ☆30Updated 4 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago