NorthcoteHS / 10DPRO
Year 9-10 Programming
☆8Updated 4 years ago
Alternatives and similar repositories for 10DPRO:
Users that are interested in 10DPRO are comparing it to the libraries listed below
- Veil 3.1.X (Check version info in Veil at runtime)☆4,082Updated last year
- A swiss army knife for pentesting networks☆8,668Updated last year
- Credentials recovery project☆9,920Updated last week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,162Updated 6 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,813Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,580Updated 5 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,918Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,271Updated 6 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,776Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,660Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,128Updated 11 months ago
- Mimikatz implementation in pure Python☆2,983Updated last month
- Privilege Escalation Project - Windows / Linux / Mac☆2,517Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,751Updated last month
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,054Updated last year
- A tool to dump the login password from the current linux user☆3,935Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,437Updated 7 months ago
- Attack Surface Management Platform☆8,639Updated last month
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,498Updated last week
- The LAZY script will make your life easier, and of course faster.☆4,164Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,257Updated 4 years ago
- Learning to See in the Dark. CVPR 2018☆5,489Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆14,149Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,405Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,647Updated 4 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,141Updated 2 weeks ago
- Defeating Windows User Account Control☆6,691Updated last month
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆11,738Updated 10 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,038Updated 7 months ago
- Linux privilege escalation auditing tool☆5,886Updated last year