ariary / gitarLinks
π‘ Ease file sharing during pentest/CTF πΈ
β12Updated 3 years ago
Alternatives and similar repositories for gitar
Users that are interested in gitar are comparing it to the libraries listed below
Sorting:
- Exactly what it sounds like, which is something radβ22Updated 3 years ago
- Basic Dart reverse shell codeβ21Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talkβ10Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generatorβ57Updated 3 years ago
- Writeup of CVE-2020-15906β49Updated 5 years ago
- β12Updated last year
- A fast wordlist to nthash converterβ21Updated 3 years ago
- DO NOT RUN THIS.β47Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansibleβ24Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxesβ12Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesomeβ¦β24Updated 3 years ago
- A basic proxylogon scannerβ27Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ90Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.β37Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolvedβ33Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforceβ13Updated 9 months ago
- an Evil Java RMI Registry.β51Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- A little implant which SSH's back with a shellβ38Updated 3 years ago
- Modified version of PEAS client for offensive operationsβ42Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Toolβ24Updated 3 years ago
- Distributed phishing framework designed to streamline offensive security phishingβ41Updated 2 years ago
- OWASP Foundation Web Respositoryβ36Updated 4 years ago
- Perform Windows domain enumeration via LDAPβ37Updated 3 years ago
- β12Updated 3 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sysβ¦β18Updated 3 weeks ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 3 years ago
- Log converter from CS log to Ghostwriter CSVβ31Updated 4 years ago