Vulnerability Assessment and Penetration Testing Toolkit
☆19Jan 5, 2022Updated 4 years ago
Alternatives and similar repositories for Scythian
Users that are interested in Scythian are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- MS17-010 multithreading scanner written in python.☆75May 20, 2017Updated 8 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Some useful scripts for penetration testing☆46May 20, 2017Updated 8 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Nov 20, 2018Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Aug 26, 2020Updated 5 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Python Powered Repository☆15Jan 22, 2020Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago