JollyFrogs / toolsLinks
Tinkering with bits and bytes
☆11Updated last year
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Oracle Attacks Tool☆13Updated 9 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- ☆23Updated 8 years ago
- An offensive Powershell console☆30Updated 10 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- ☆19Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆64Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Simple DDE object detector☆56Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- The documents☆56Updated 8 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- Office 365 MFA capture toolkit☆14Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 9 years ago
- SysCon14 release☆55Updated 8 years ago
- Communicate with a remote shell easily☆12Updated 8 years ago