SleepTheGod / TCP-Data-Transfer-Tool
TCP Data Transfer Tool By ClumsyLulz
☆12Updated 2 years ago
Alternatives and similar repositories for TCP-Data-Transfer-Tool:
Users that are interested in TCP-Data-Transfer-Tool are comparing it to the libraries listed below
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- ☆21Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- MacroExploit use in excel sheet☆20Updated last year
- ☆13Updated last year
- ☆16Updated 11 months ago
- ☆24Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- A Python script to find tenant id an region from a list of domain names.☆12Updated last month
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- ☆27Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 7 months ago
- ☆17Updated 3 months ago
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 5 months ago
- wsnet☆24Updated 2 weeks ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated last year
- Tool for scanning domains for .git directories.☆13Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆12Updated 2 years ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 10 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year