ariary / gitarLinks
π‘ Ease file sharing during pentest/CTF πΈ
β11Updated 3 years ago
Alternatives and similar repositories for gitar
Users that are interested in gitar are comparing it to the libraries listed below
Sorting:
- Basic Dart reverse shell codeβ21Updated 2 years ago
- A basic proxylogon scannerβ27Updated 4 years ago
- β12Updated 2 years ago
- Writeup of CVE-2020-15906β49Updated 5 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Toolβ24Updated 4 years ago
- OWASP Foundation Web Respositoryβ36Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talkβ10Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.β37Updated 4 years ago
- an Evil Java RMI Registry.β51Updated 3 years ago
- DO NOT RUN THIS.β47Updated 4 years ago
- Exactly what it sounds like, which is something radβ22Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ32Updated 4 years ago
- Automated compromise detection of the world's most popular packagesβ17Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 3 years ago
- Reverse Shell troll softwareβ12Updated 6 years ago
- β12Updated 3 years ago
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ94Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scannerβ46Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansibleβ24Updated 4 years ago
- β18Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolvedβ32Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environmeβ¦β47Updated 5 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesomeβ¦β24Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.comβ38Updated 3 years ago
- Query various sources for CVE proof-of-conceptsβ53Updated 2 years ago
- Data exfiltration utility for testing detection capabilitiesβ57Updated 4 years ago
- pwncat windows c2 componentsβ22Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.β77Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21972β27Updated 4 years ago
- Default plugins for Jaeles Scannerβ35Updated 5 years ago