TH3xACE / SCREEN_KILLERLinks
This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.
☆75Updated 5 years ago
Alternatives and similar repositories for SCREEN_KILLER
Users that are interested in SCREEN_KILLER are comparing it to the libraries listed below
Sorting:
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- ☆19Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- Windows privilege escalation with cmd☆90Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Journey to Try Harder !!!☆32Updated 6 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- ☆154Updated last week
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- Information-Gathering Shell Script☆30Updated 5 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Various scripts and codes☆85Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 8 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Updated 6 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago