\ PowerAvails Powershell /
☆10Jun 30, 2018Updated 7 years ago
Alternatives and similar repositories for Post-Exploitation
Users that are interested in Post-Exploitation are comparing it to the libraries listed below
Sorting:
- Clases de Implantación de Sistemas Operativos☆25Feb 17, 2026Updated last week
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- 收集了java XXE漏洞的demo及修复方式☆19Mar 11, 2024Updated last year
- SecNews 文章分享系统☆15Jun 6, 2018Updated 7 years ago
- My write ups - Capture the flag challanges☆19Nov 18, 2022Updated 3 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆153Jul 31, 2023Updated 2 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- CTF学习交流入群题 Web 20180626☆24Sep 28, 2019Updated 6 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- ctf101 systems security repository☆26Jul 19, 2021Updated 4 years ago