Post-exploitation tool collects data going out and coming into the browser and makes use of it.
☆23Apr 22, 2022Updated 3 years ago
Alternatives and similar repositories for 6-Eyed-Spider
Users that are interested in 6-Eyed-Spider are comparing it to the libraries listed below
Sorting:
- ☆11Apr 10, 2021Updated 4 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Feb 9, 2026Updated last month
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- PowerShell module to assist with Group Policy☆14Jan 6, 2020Updated 6 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 3 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 2 months ago
- Scoring Engine for Red/White/Blue Team Competitions☆135Updated this week
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated 2 months ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago