SySS-Research / clone-certLinks
Simple shell script to "clone" X.509 certificates
☆111Updated 10 months ago
Alternatives and similar repositories for clone-cert
Users that are interested in clone-cert are comparing it to the libraries listed below
Sorting:
- ☆52Updated 6 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Updated 7 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆114Updated 9 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆88Updated 7 years ago
- My python3 implementation of a Forward Shell☆36Updated 7 years ago
- Enumerate RIDs using pure Python☆32Updated last month
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- Hiding implants in HTML files☆66Updated 5 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆226Updated 10 months ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Sustainable shellcode evasion☆112Updated last year
- WStalker: an easy proxy☆25Updated 5 years ago
- A fork of openssh-portable for penetration testing purposes.☆11Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- Executables that execute other stuff☆54Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- A Win7 RDP exploit☆113Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- Password list collected from Cisco devices☆20Updated 6 years ago
- Responder for Python3☆100Updated 6 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago