ajmwagar / tetanus
A proof-of-concept reverse-shell written in rust.
☆33Updated 5 years ago
Alternatives and similar repositories for tetanus:
Users that are interested in tetanus are comparing it to the libraries listed below
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- Basic Dart reverse shell code☆21Updated last year
- Fast and intuitive manager for multiple reverse shells☆85Updated 4 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆20Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆32Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Offensive go lang series☆32Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- Creates and sends fake meeting invite☆59Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- PowerShell payload generator☆116Updated 3 years ago