TRSTN4 / EagleShell
EagleShell is a high-quality tool that aims to improve your pentest.
☆77Updated 4 years ago
Alternatives and similar repositories for EagleShell:
Users that are interested in EagleShell are comparing it to the libraries listed below
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆138Updated 5 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- An epic web shell☆84Updated last month
- An advanced graphical search engine for Exploit-DB☆117Updated 9 months ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- ☆25Updated 7 months ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆72Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆29Updated 4 months ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated last year
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- ☆47Updated 3 years ago
- ☆51Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- ☆150Updated last year
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- ☆46Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- OSCP Buffer Overflow in 30 minutes☆35Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆43Updated last year
- interact with HackTheBox from your terminal☆24Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆63Updated last year
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago