Miscellaneous pentesting scripts for OSCP
☆59Dec 3, 2018Updated 7 years ago
Alternatives and similar repositories for c0toolkit
Users that are interested in c0toolkit are comparing it to the libraries listed below
Sorting:
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆299Oct 2, 2019Updated 6 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆1,003Jan 15, 2019Updated 7 years ago
- Wraps github api for openly available information about an organization, user, or repo☆128May 22, 2023Updated 2 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 5 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- ☆13Oct 12, 2019Updated 6 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆139Mar 30, 2025Updated 11 months ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,184Dec 11, 2022Updated 3 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Oct 23, 2020Updated 5 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Jul 21, 2020Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- ☄️ go-out - A Golang egress buster.☆126Feb 6, 2026Updated last month
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- A collection of nmap scripts I've written☆23Mar 27, 2016Updated 9 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago