JollyFrogs / toolsLinks
Tinkering with bits and bytes
☆11Updated last year
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Oracle Attacks Tool☆13Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Generates several metasploit payloads☆15Updated 7 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- ☆19Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Automated enumeration☆30Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 4 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Updated 7 years ago
- Simple DDE object detector☆56Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Communicate with a remote shell easily☆12Updated 8 years ago
- Basic Auth Phish page☆25Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- An offensive Powershell console☆30Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- ☆83Updated 9 years ago