am0nsec / valhallaLinks
The Hall of Ancient Exploitation Tools
☆16Updated 5 years ago
Alternatives and similar repositories for valhalla
Users that are interested in valhalla are comparing it to the libraries listed below
Sorting:
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- ☆17Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- ☆20Updated 11 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- ☆10Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Software exploitation training material☆15Updated 8 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆1Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago