JollyFrogs / tools
Tinkering with bits and bytes
☆11Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for tools
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- ☆21Updated 7 years ago
- ☆19Updated 7 years ago
- Generates several metasploit payloads☆15Updated 6 years ago
- Automated enumeration☆30Updated 3 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- PIC code gen and loading☆13Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- AV Bypass☆28Updated 6 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 5 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- ☆0Updated 5 years ago
- ☆9Updated 6 years ago