KevCui / pencoder
Yet another powerful payload encoder/decoder
☆14Updated 2 years ago
Alternatives and similar repositories for pencoder:
Users that are interested in pencoder are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆13Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 7 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Burp suite Certificate modification tool☆18Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Sp00fer blog post -☆25Updated 2 years ago
- buffer overflow examples☆21Updated 7 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Updated 4 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 2 weeks ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- TORAPF is a Tor Network Admin Page Finder Tool.It can help to get admin page from tor network.☆12Updated 4 years ago
- cool dockerfiles☆12Updated 8 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year