L3ster1337 / GPTBypassLinks
β16Updated 2 years ago
Alternatives and similar repositories for GPTBypass
Users that are interested in GPTBypass are comparing it to the libraries listed below
Sorting:
- γπͺγLinux Backdoor based on ICMP protocolβ64Updated 7 months ago
- β18Updated 3 weeks ago
- β20Updated 3 years ago
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.β28Updated 8 months ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actionsβ17Updated 8 months ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.β24Updated 4 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents toβ¦β15Updated last year
- A "Spring4Shell" vulnerability scanner.β49Updated 5 months ago
- Automated HTTP Request Repeating With Burp Suiteβ38Updated 2 years ago
- Random Exploitsβ50Updated last year
- β19Updated 4 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 2 years ago
- β44Updated last year
- β43Updated 2 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting commaβ¦β34Updated last year
- Enumerate AWS cloud resources based on provided credentialβ51Updated 3 years ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and β¦β14Updated 2 weeks ago
- A script used to query the dehashed API and filter for more useful resultsβ16Updated 4 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES coursesβ14Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environmentsβ13Updated last year
- This map lists the essential techniques to bypass anti-virus and EDRβ15Updated last year
- β25Updated 2 years ago
- β16Updated 9 months ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on Lβ¦β25Updated 2 months ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanningβ19Updated 8 months ago
- Tools used for Pentestingβ22Updated 2 years ago
- β27Updated 2 years ago
- An application to test windows and linux shellcodesβ92Updated 8 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office docβ¦β14Updated 3 months ago
- β56Updated 2 years ago