๐ก Ease file sharing during pentest/CTF ๐ธ
โ11Oct 18, 2022Updated 3 years ago
Alternatives and similar repositories for gitar
Users that are interested in gitar are comparing it to the libraries listed below
Sorting:
- โ17Updated this week
- A set of 10 challenges for Forensics workshop, VIDYUT'19โ15Jul 23, 2020Updated 5 years ago
- Auto Web Vulnerability Scanning Frameworkโ10Feb 3, 2016Updated 10 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccessโ10Aug 1, 2021Updated 4 years ago
- Collection of things made during my SLAE 32-bit journeyโ14Feb 24, 2022Updated 4 years ago
- Kiddy - (linux) kernel identity spooferโ15Mar 18, 2024Updated last year
- The Hall of Ancient Exploitation Toolsโ16Oct 14, 2019Updated 6 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell anโฆโ21Apr 4, 2022Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-inโ34May 16, 2022Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commandsโ19Apr 19, 2021Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connectionsโ17Oct 15, 2018Updated 7 years ago
- Windows API/constants, identity, and WinHTTP/WinINet for Go.โ19Jan 13, 2026Updated last month
- Tool to find stored robots.txt files from the pastโ19Jun 4, 2023Updated 2 years ago
- LSTAR - CobaltStrike Translated to ENโ22Jun 15, 2023Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing supportโ23Sep 15, 2021Updated 4 years ago
- Scripts for OSCEโ18Dec 28, 2018Updated 7 years ago
- Burp extention to automatically generate OpenAPI Json for Swagger from proxy trafficโ22Aug 3, 2022Updated 3 years ago
- ๆถ่webshellโ25Mar 14, 2022Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teamingโ21Jan 17, 2020Updated 6 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.โ36Oct 17, 2021Updated 4 years ago
- โ13May 24, 2023Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!โ19Nov 5, 2020Updated 5 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.โ37Dec 20, 2021Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and providโฆโ59Dec 15, 2025Updated 2 months ago
- โ16Jan 12, 2022Updated 4 years ago
- A collection of notes and script that will help you learn basics of hacking with Pythonโ34Nov 3, 2014Updated 11 years ago
- Another AMSI bypass - but in C++.โ25May 22, 2023Updated 2 years ago
- Find sources and sinks in js code that could lead to DOM XSS ๐๐ง๐ฐโ23Feb 27, 2024Updated 2 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.โ25Oct 29, 2019Updated 6 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platformโ61Jun 28, 2020Updated 5 years ago
- โ23Nov 23, 2019Updated 6 years ago
- Notion as an HTTP proxyโ35Mar 7, 2023Updated 2 years ago
- AMSI Bypass for powershellโ30Apr 26, 2022Updated 3 years ago
- โ26Jun 19, 2022Updated 3 years ago
- Some handy bash scripts I used for the OSCPโ24Oct 1, 2022Updated 3 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)โ32Jun 15, 2020Updated 5 years ago
- Information for accessing The Cyber Plumber's Handbook Labโ31Oct 10, 2022Updated 3 years ago
- ๐ฎ INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)โ32Nov 3, 2023Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.โฆโ205Jul 2, 2024Updated last year