LogoiLab / injektilo
An example command dropper in rust.
☆14Updated 6 years ago
Related projects: ⓘ
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆54Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 6 years ago
- PHP Phishing Framework☆27Updated 10 years ago
- Metasploit things, modules, plugins, exploits☆24Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Efficient clustering of MASSCAN results☆12Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Just another tool to screenshot web servers☆16Updated last year
- Search bing with python☆11Updated 9 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 9 years ago
- Six Degrees of Domain Admin☆15Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- A collection of scripts made duing my personal research☆28Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆40Updated 13 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Hunting cryptonote-related miners☆22Updated 3 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 8 years ago
- Set of PoC for exploits for QRadar SIEM☆14Updated 6 years ago
- Collect hashes password hashes for cracking☆30Updated 10 years ago