OpenSource cross-platform python security toolkit (remote shell)
☆44Nov 12, 2022Updated 3 years ago
Alternatives and similar repositories for pupy
Users that are interested in pupy are comparing it to the libraries listed below
Sorting:
- ☆12Apr 21, 2019Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 8 years ago
- Burp extension to edit messages with UTF-8☆12Jul 3, 2018Updated 7 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Introducing SQLMAP into non-HTTP services.☆13Oct 24, 2019Updated 6 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12May 2, 2016Updated 9 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆72Feb 13, 2021Updated 5 years ago
- This is a tool for pentesters which scan for VLANs on a network link.☆17May 12, 2015Updated 10 years ago
- Various programming experiments written in x86_64 assembly language.☆14Sep 28, 2016Updated 9 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- Heartbleed test script for OpenVPN☆34Apr 10, 2014Updated 11 years ago
- Virtual desktops for Windows☆10Oct 30, 2015Updated 10 years ago
- Find infected ms17-010 machines☆14May 26, 2017Updated 8 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- An Advanced C# .NET Rat, It’s Stable and Contains Many Features.☆271Apr 30, 2018Updated 7 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- Détecteur box vulnérables à la brèche PIN NULL☆13Sep 15, 2017Updated 8 years ago
- ☆45Mar 2, 2020Updated 6 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- scanver☆21Nov 13, 2018Updated 7 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- •.NET Clipboard for Nim•☆15May 16, 2019Updated 6 years ago
- Additional plugins for Pluma☆17Mar 2, 2017Updated 9 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago