TH3xACE / SCREEN_KILLERLinks
This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.
☆76Updated 5 years ago
Alternatives and similar repositories for SCREEN_KILLER
Users that are interested in SCREEN_KILLER are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- ☆14Updated 4 years ago
- ☆151Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 3 weeks ago
- Cheat-Sheet of tools for penetration testing☆56Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Pentest stuff☆49Updated last year
- Anonymize your hashcat formatted files for online cracking☆31Updated 10 months ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago