Nitr4x / p0wn-boxView external linksLinks
☆28Oct 4, 2018Updated 7 years ago
Alternatives and similar repositories for p0wn-box
Users that are interested in p0wn-box are comparing it to the libraries listed below
Sorting:
- ☆16Sep 4, 2024Updated last year
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Basic Flask examples, written in Python3☆17Jan 14, 2021Updated 5 years ago
- Python tool which scours popular CI tools build logs☆16Dec 8, 2022Updated 3 years ago
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- Stealthy Stand Alone PHP Web Shell☆33Sep 12, 2019Updated 6 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Mar 17, 2019Updated 6 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Anycubic Photon - Files and method to quickly find the best latitude exposure settings for any resin or 405nm UV coating☆11Nov 5, 2020Updated 5 years ago
- vscode-extension-highlight☆14Jul 18, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- 🎨Community driven colour palettes☆12May 1, 2020Updated 5 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 7 months ago
- ☆10Dec 27, 2022Updated 3 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Beautiful Nord & Catppuccin Wallpapers 🏞️☆18Jun 29, 2025Updated 7 months ago
- Python port of Boilerpipe library☆16Apr 6, 2018Updated 7 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆14Jul 10, 2025Updated 7 months ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- Dante socks proxy + FreeRadius + DaloRadius + MySQL + phpMyAdmin☆10Aug 29, 2017Updated 8 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- CDB-PIg is a plugin for cdb, but not windbg.☆11Nov 29, 2018Updated 7 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 8 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 8 months ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago