M507 / Nemo
A copy of my little beautiful malware I used in IRSeC 2019
☆10Updated 4 years ago
Alternatives and similar repositories for Nemo:
Users that are interested in Nemo are comparing it to the libraries listed below
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- A collection of resources that I've used to learn things☆14Updated 3 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- ☆99Updated last month
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 5 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 8 months ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- ☆54Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- ☆52Updated 6 years ago
- Simple script to generate commands to achieve reverse shells.☆117Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- ☆143Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- List of Repositories☆96Updated 3 years ago
- ☆27Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆177Updated last year
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- Custom exploits that I made for Hack The Box machines!☆37Updated 3 years ago
- For all your network pentesting needs☆152Updated 9 months ago
- Microsoft External Attack Tool☆178Updated 2 years ago