atechdad / badkarma
☆11Updated 9 years ago
Alternatives and similar repositories for badkarma:
Users that are interested in badkarma are comparing it to the libraries listed below
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 4 years ago
- ☆47Updated 9 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆105Updated 10 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- Run PowerShell command without invoking powershell.exe☆12Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- MS17-010☆12Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Software exploitation training material☆15Updated 7 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated 2 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago