ariary / gitarLinks
π‘ Ease file sharing during pentest/CTF πΈ
β12Updated 2 years ago
Alternatives and similar repositories for gitar
Users that are interested in gitar are comparing it to the libraries listed below
Sorting:
- Forblaze - A Python Mac Steganography Payload Generatorβ57Updated 3 years ago
- an Evil Java RMI Registry.β51Updated 2 years ago
- Writeup of CVE-2020-15906β48Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansibleβ24Updated 4 years ago
- A basic proxylogon scannerβ27Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.β37Updated 3 years ago
- β12Updated last year
- visually see issues with supported cipher suitesβ17Updated last year
- A tool to parse, deduplicate, and query multiple port scans.β59Updated 2 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keysβ20Updated 4 years ago
- Modified version of PEAS client for offensive operationsβ42Updated 2 years ago
- Basic Dart reverse shell codeβ21Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesomeβ¦β24Updated 3 years ago
- A fast wordlist to nthash converterβ21Updated 3 years ago
- Exactly what it sounds like, which is something radβ22Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talkβ10Updated 3 years ago
- OWASP Foundation Web Respositoryβ36Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them bβ¦β21Updated last month
- Automated compromise detection of the world's most popular packagesβ17Updated 2 years ago
- S3 bucket enumeratorβ30Updated 6 years ago
- Log converter from CS log to Ghostwriter CSVβ30Updated 4 years ago
- A little implant which SSH's back with a shellβ38Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Serverβ25Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- β23Updated 3 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)β69Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Updated 3 years ago
- post exploitation user monitoring toolβ20Updated 7 years ago
- β54Updated 4 years ago