VbScrub / PortTunnelLinks
PT.exe
☆17Updated 5 years ago
Alternatives and similar repositories for PortTunnel
Users that are interested in PortTunnel are comparing it to the libraries listed below
Sorting:
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated last year
- Scripts and One-Liners☆22Updated 7 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- A VS Code extension to preview XML nmap output☆44Updated 7 months ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- ☆17Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- A Simple Password Protected Back Door written in Python3☆21Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated 3 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago