ashemery / tariq
Hybrid Port Knocking System
☆22Updated 4 years ago
Alternatives and similar repositories for tariq:
Users that are interested in tariq are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A curated list of tools for incident response☆29Updated last year
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- ☆16Updated 2 years ago
- Basic file metadata gathering script☆21Updated 3 weeks ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 9 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆12Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆20Updated 4 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- PoC Linux backdoor program to allow the "remote" use of terminal from client to the compromised machine.☆6Updated 9 years ago