JosephFrankFir / Megaploit
☆19Updated this week
Related projects: ⓘ
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated last month
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- ☆11Updated this week
- Automate Blind SQL Injection with Python.☆19Updated 2 years ago
- Shell hunter for AF☆34Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- ☆12Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆10Updated last year
- Another vulnerability scanner☆17Updated 10 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆17Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated last year
- ☆21Updated last year
- ☆16Updated this week
- A tool for steganography of png files .☆24Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- A Hacking and Pentesting Tool for Windows☆18Updated 5 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- ☆18Updated this week
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- Your Handy Dandy Cyber Swiss Army Knife!☆21Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- An automated e-mail OSINT tool☆17Updated 2 years ago