Customized Kali Linux - Ansible playbook
☆67Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for Kali-TX
Users that are interested in Kali-TX are comparing it to the libraries listed below
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Dec 3, 2016Updated 9 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Pypykatz server☆123Mar 15, 2019Updated 6 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆246Sep 2, 2019Updated 6 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- A passive online scanner from OWTF☆16Feb 16, 2026Updated 3 weeks ago
- Shmoocon 2019 Firetalk☆21Jan 18, 2019Updated 7 years ago