A rogue-USB-device defeat program for Windows.
☆188Jun 22, 2022Updated 3 years ago
Alternatives and similar repositories for beamgun
Users that are interested in beamgun are comparing it to the libraries listed below
Sorting:
- A Privacy-Conscious, DNS-over-HTTP-Enabled, Blacklist-Incorporating SOCKS5 Proxy☆30Feb 28, 2019Updated 7 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- ☆25Nov 18, 2016Updated 9 years ago
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Wolves Among the Sheep☆147Sep 3, 2023Updated 2 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12May 16, 2016Updated 9 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- ☆25May 13, 2019Updated 6 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Nov 17, 2017Updated 8 years ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆121Apr 24, 2019Updated 6 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago