Sudneo / sicksploitLinks
Collection of tool to find and exploit exposed SickChill/Rage instances
☆18Updated 7 years ago
Alternatives and similar repositories for sicksploit
Users that are interested in sicksploit are comparing it to the libraries listed below
Sorting:
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 6 years ago
- Simplified NAT Slipstream server and client☆22Updated 5 years ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆24Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Furbo Security Research☆41Updated 3 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 5 years ago
- ☆47Updated last week
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Updated last year
- Geppetto - Virtual machine and infrastructure orchestration☆14Updated 11 months ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Secure File Transfer via Global Socket Bounce Network☆25Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 4 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Updated 3 years ago
- Hackable Windows SandBox environment☆32Updated 2 years ago
- ☆28Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 6 years ago
- Reverse shell container for k8s deployments☆49Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- The pentest companion☆15Updated 4 years ago
- Wireguard over TCP / HTTP using wstunnel for windows and linux☆11Updated 11 months ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Simple Go Discord Bot☆23Updated 2 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Updated 8 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Updated 3 years ago