Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols
☆116Feb 26, 2020Updated 6 years ago
Alternatives and similar repositories for udp-hunter
Users that are interested in udp-hunter are comparing it to the libraries listed below
Sorting:
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Penetration testing utility and antivirus assessment tool.☆315Apr 25, 2023Updated 2 years ago
- A robust tunelling solution written in golang☆274May 17, 2023Updated 2 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 5 months ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- ☆57May 13, 2020Updated 5 years ago
- Password list generator for password spraying - prebaked with goodies☆108Feb 21, 2023Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 3 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Aug 23, 2022Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago