SpookySec / CRYPTed
☆13Updated 4 years ago
Alternatives and similar repositories for CRYPTed:
Users that are interested in CRYPTed are comparing it to the libraries listed below
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Ruby ARP Toolkit☆14Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated 2 years ago
- little helping scripts that I use daily☆11Updated 3 years ago
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆52Updated 2 months ago
- ☆48Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Python Penetration Testing Tools☆17Updated last year
- A Tool which can exploit 137 files from GTFO-Bins automaticlly☆12Updated 5 years ago
- You don't need wires to be connected☆40Updated 5 years ago
- Pipe different tools with google dork Scanner☆56Updated 4 years ago
- Pull Hashes Decryption From Online Sources Using Python☆16Updated 10 months ago
- ☆45Updated 4 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆55Updated 3 years ago
- DNS hijacking via dead records automation tool☆52Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- ☆20Updated 3 years ago
- Beginners tools for CTF☆18Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- A script to search for URLs with parameters worthy testing for vulnerabilities☆16Updated 2 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- Random PowerShell scripts mainly focused on post-exploitation capabilities☆7Updated last year
- Command Execution exploiter with an auto connection handling☆32Updated 2 years ago
- The Multi-Tool Web application vulnerability scanner.☆52Updated 3 years ago
- Notes for efficient and easier engagements - notes over time☆23Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago