PinkP4nther / revshfuzz
A tool for fuzzing for ports that allow outgoing connections
☆18Updated 6 years ago
Alternatives and similar repositories for revshfuzz:
Users that are interested in revshfuzz are comparing it to the libraries listed below
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Suite for Information gathering☆12Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- ☆13Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆13Updated 12 years ago