SpookySec / CRYPTedLinks
☆13Updated 4 years ago
Alternatives and similar repositories for CRYPTed
Users that are interested in CRYPTed are comparing it to the libraries listed below
Sorting:
- Ruby ARP Toolkit☆14Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 4 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- ☆27Updated 6 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Updated 7 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Random Exploits☆50Updated 2 years ago
- Journey to Try Harder !!!☆33Updated 6 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ☆22Updated 9 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆12Updated 4 years ago
- An offensive security framework for writing payloads☆18Updated 3 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated last week
- Python Penetration Testing Tools☆17Updated 2 months ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago