atechdad / badkarma
☆11Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for badkarma
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 8 years ago
- Universal LAN-based SSRF Attack Primitive☆18Updated 5 years ago
- suspect is a simple bash triage tool☆17Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- ☆17Updated 11 months ago
- Collection of scripts that I have used on Red Team engagements☆14Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆13Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- Gmail Knocker☆21Updated 7 years ago
- LFI Exploitation Tool☆9Updated 7 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆33Updated 7 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆57Updated last year
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- Random Tools☆37Updated 5 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Quantum Insert Backdoor POC☆10Updated 7 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 6 years ago
- Suite for Information gathering☆12Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated this week