M507 / Nemo
A copy of my little beautiful malware I used in IRSeC 2019
☆10Updated 4 years ago
Alternatives and similar repositories for Nemo
Users that are interested in Nemo are comparing it to the libraries listed below
Sorting:
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- A collection of resources that I've used to learn things☆14Updated 3 years ago
- ☆54Updated 4 years ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆118Updated 4 years ago
- ☆99Updated 3 months ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 5 years ago
- ☆52Updated 6 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 5 months ago
- For all your network pentesting needs☆154Updated 10 months ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 10 months ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- ☆27Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Passive internal reconnaissance tool☆70Updated 2 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 9 months ago
- ☆146Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago