A modular pentesting framework implemented in C
☆13Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for PPF
Users that are interested in PPF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- personal fork of OSINT tool recon-ng☆16Dec 17, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- This is an example of SSH Man in the Middle (MITM) attack using Mininet and Ettercap☆15Sep 24, 2015Updated 10 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated last week
- An example rootkit that gives a userland process root permissions☆78Oct 17, 2019Updated 6 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- The simplest way to take an automated screenshot of given URLs. Easy installation! Edit☆47Jun 4, 2018Updated 7 years ago
- iOS forensics utility☆13May 8, 2018Updated 7 years ago
- cms识别☆13Dec 2, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- BlackArch Linux Slim ISO☆22Jun 30, 2018Updated 7 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- An android spying application☆38Jul 25, 2018Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- A tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices☆22Jan 10, 2017Updated 9 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- DHCP option injector☆42Jul 7, 2020Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 9 years ago
- ios hacking stuff☆12Jun 25, 2016Updated 9 years ago
- ☆17Aug 30, 2018Updated 7 years ago