SlyPI
☆20Jun 13, 2013Updated 12 years ago
Alternatives and similar repositories for Slypi
Users that are interested in Slypi are comparing it to the libraries listed below
Sorting:
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- apk binder script☆60Apr 7, 2014Updated 11 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Powershell Reverse Rubber Ducky☆57Jun 18, 2015Updated 10 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Penetration testing on windows(7 or 8)☆25Oct 21, 2020Updated 5 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- golang amsi bypass☆30Dec 4, 2021Updated 4 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Operational toolset utilizing git's submodule feature☆57Feb 6, 2013Updated 13 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Reverse shell using go☆38Feb 21, 2019Updated 7 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- service to check internet accessibility☆42Apr 30, 2024Updated last year
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago