ariary / gitarLinks
π‘ Ease file sharing during pentest/CTF πΈ
β11Updated 3 years ago
Alternatives and similar repositories for gitar
Users that are interested in gitar are comparing it to the libraries listed below
Sorting:
- A basic proxylogon scannerβ27Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generatorβ56Updated 3 years ago
- Exactly what it sounds like, which is something radβ22Updated 3 years ago
- Writeup of CVE-2020-15906β49Updated 5 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxesβ12Updated 4 years ago
- β18Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 3 years ago
- β12Updated 2 years ago
- A fast wordlist to nthash converterβ21Updated 4 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sysβ¦β18Updated last week
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scannerβ46Updated 5 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keysβ22Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/memβ23Updated 2 years ago
- OWASP Foundation Web Respositoryβ36Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talkβ10Updated 3 years ago
- Basic Dart reverse shell codeβ21Updated 2 years ago
- Reverse Shell troll softwareβ12Updated 6 years ago
- PoC for CVE-2021-4034 dubbed pwnkitβ35Updated 4 years ago
- an Evil Java RMI Registry.β51Updated 2 years ago
- Execute Mimikatz with different techniqueβ51Updated 4 years ago
- Log converter from CS log to Ghostwriter CSVβ31Updated 5 years ago
- β37Updated 5 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.β19Updated 4 years ago
- pwncat windows c2 componentsβ21Updated 4 years ago
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ94Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolvedβ32Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesomeβ¦β24Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β58Updated 4 years ago
- Tool for pivoting over SMB pipesβ18Updated 6 years ago
- Perform Windows domain enumeration via LDAPβ37Updated 3 years ago