Ignitetechnologies / Persistence-Accessibility-Features
This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows
☆29Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Persistence-Accessibility-Features
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆24Updated 4 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆26Updated 3 years ago
- Notes only☆14Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆40Updated 3 years ago
- OWASP based Web Application Security Testing Checklist☆66Updated 4 months ago
- A learning and testing environment for web application hacking and pentesting.☆24Updated 3 years ago
- ☆62Updated last year
- ☆29Updated 3 years ago
- ☆29Updated 3 years ago
- Mind Maps for penetration testing☆17Updated 3 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- Simple username generator based on a list of name and surname☆12Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 2 years ago
- Offensive Security Wireless Professional☆17Updated 4 years ago
- Pentesting notes☆17Updated last year
- Bash script to generate reverse shell payloads☆20Updated last year
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Repository of cybersecurity mindmaps☆30Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- ☆125Updated 2 years ago
- Notes on ECPPT☆22Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆56Updated last year
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆26Updated 3 years ago
- Advanced Pentesting cheatsheet for RED & PRO☆19Updated 5 months ago
- ☆16Updated 6 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- A python approach to interacting with web shells.☆29Updated 3 years ago