TH3xACE / SCREEN_KILLER
This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.
☆72Updated 4 years ago
Alternatives and similar repositories for SCREEN_KILLER:
Users that are interested in SCREEN_KILLER are comparing it to the libraries listed below
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Pentest stuff☆49Updated last year
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- ☆30Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- ☆20Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- ☆14Updated 4 years ago
- Useful scripts for pen testing. Require modification to run☆13Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆59Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆28Updated 3 months ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆44Updated 9 years ago
- Tool to generate csrf payloads based on vulnerable requests☆62Updated 4 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆36Updated 5 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated last year
- Super organized and flexible script for sending phishing campaigns☆54Updated 3 years ago
- Buffer Overflows☆29Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- ☆35Updated 3 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- OSCP Notes written from PWK Course☆46Updated 3 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆23Updated 2 weeks ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated 8 months ago