Veil-Framework / VeilDependencies
Dependencies for Veil 3
☆17Updated 7 years ago
Related projects: ⓘ
- ☆21Updated this week
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- Projects and POCs☆58Updated 10 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆12Updated 9 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Interactive Post Exploitation Tool☆36Updated 4 years ago
- ☆23Updated this week
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 6 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- ☆47Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- ☆38Updated this week
- ☆23Updated this week
- Converts a command to a base64 powershell compatible string☆24Updated 10 years ago
- ☆36Updated this week
- Miscellaneous projects related to attacking Windows.☆27Updated 5 years ago
- A collection of Nmap NSE scripts that I made.☆26Updated 11 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 7 years ago
- ☆10Updated this week
- Mimikatz HashClash☆12Updated 9 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆49Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆34Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 3 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago