SpookySec / CRYPTedLinks
☆13Updated 5 years ago
Alternatives and similar repositories for CRYPTed
Users that are interested in CRYPTed are comparing it to the libraries listed below
Sorting:
- Reverse Shell troll software☆12Updated 6 years ago
- Random Exploits☆50Updated 2 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Updated 7 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Updated 2 months ago
- DNS hijacking via dead records automation tool☆53Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Python Penetration Testing Tools☆17Updated 6 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- An automated scanning, enumeration, and note taking tool for pentesters☆13Updated 3 years ago
- ☆19Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- Wordlists for intelligent directory brute-forcing☆33Updated 4 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated last year
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Ruby ARP Toolkit☆14Updated 4 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Updated 4 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Updated 6 years ago
- ☆49Updated 5 years ago
- ☆27Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- ☆20Updated 5 months ago
- Pentest stuff☆50Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago