RackunSec / dpsLinks
Demon Pentest Shell
☆15Updated 4 years ago
Alternatives and similar repositories for dps
Users that are interested in dps are comparing it to the libraries listed below
Sorting:
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- Simple Karma Attack☆68Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- An epic web shell☆85Updated 7 months ago
- ☆53Updated 4 years ago
- ☆33Updated 11 months ago
- Red Team Tool Kit☆16Updated 6 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- ☆30Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated last week
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- Customized Kali Linux - Ansible playbook☆66Updated 5 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago