SamOBoy97 / SamSploit
☆11Updated this week
Related projects: ⓘ
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated last month
- ☆15Updated this week
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- ☆11Updated this week
- Automate Blind SQL Injection with Python.☆19Updated 2 years ago
- Your Handy Dandy Cyber Swiss Army Knife!☆21Updated 3 years ago
- ☆19Updated this week
- ☆26Updated this week
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- ☆12Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆46Updated 9 months ago
- Another vulnerability scanner☆17Updated 10 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- ☆21Updated last year
- Information Gathering and OSINT Tool☆12Updated 6 months ago
- Onionnux is a onionsite(DEEPNET/DARKNET) tool.It can help to idenitfy onionsite is active or onionsite server name.☆17Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- ☆23Updated this week
- ☆23Updated this week
- A Hacking and Pentesting Tool for Windows☆18Updated 5 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 10 months ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 2 years ago
- ☆16Updated this week
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 3 years ago