M507 / Nemo
A copy of my little beautiful malware I used in IRSeC 2019
☆10Updated 4 years ago
Alternatives and similar repositories for Nemo:
Users that are interested in Nemo are comparing it to the libraries listed below
- A collection of resources that I've used to learn things☆14Updated 3 years ago
- ☆54Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆64Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- Microsoft External Attack Tool☆177Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- For all your network pentesting needs☆150Updated 6 months ago
- Python template to assist with buffer overflows☆70Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆84Updated 3 years ago
- Custom checklists, cheatsheets, links, and scripts☆126Updated 5 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆187Updated 6 months ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆139Updated 3 years ago
- Disposable and resilient red team infrastructure with Terraform☆258Updated 5 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆208Updated 4 years ago
- Rapid Attack Infrastructure (RAI)☆303Updated last month
- Pypykatz server☆124Updated 5 years ago
- A Powershell Privilege Escalation Enumeration Script.☆306Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆63Updated 3 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆136Updated 3 years ago
- Various Cheat Sheets☆180Updated 3 years ago