JohnHammond / netstatgoLinks
Crappy Golang code to list local listening ports and their associated processes.
☆32Updated 2 years ago
Alternatives and similar repositories for netstatgo
Users that are interested in netstatgo are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- ☆45Updated 2 years ago
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆100Updated 3 months ago
- ☆38Updated 4 years ago
- Automate converting webshells into reverse shells.☆71Updated last week
- linikatz is a tool to attack AD on UNIX☆149Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- My Favorite Offensive Security Scripts☆76Updated 6 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆86Updated this week
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 3 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- ☆46Updated last month
- Simple HTTP listener for security testing☆118Updated 11 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago
- List of Command&Control (C2) software☆46Updated 3 years ago
- ☆84Updated 3 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- ☆86Updated last year
- ☆25Updated 2 years ago