audibleblink / bothanView external linksLinks
Is this IP a C2 server?
☆28Apr 21, 2020Updated 5 years ago
Alternatives and similar repositories for bothan
Users that are interested in bothan are comparing it to the libraries listed below
Sorting:
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- Some talks about security☆13Nov 20, 2020Updated 5 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated last week
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- Outlook persistence using VSTO add-ins☆87Jan 9, 2021Updated 5 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Golang version of Ghost Tunnel, or called WiFi Covert Channel☆27Jun 4, 2019Updated 6 years ago
- Python3 Metasploit automation library☆23Dec 8, 2022Updated 3 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Dec 7, 2020Updated 5 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- PSHinjector autoscript is a tool that inject shellcode(x64 payload) by powershell with python3 programing☆30May 4, 2020Updated 5 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- HTML5 WebSocket message fuzzer☆148Nov 23, 2018Updated 7 years ago
- Custom Python 2.7 RAT☆11May 25, 2016Updated 9 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆145Apr 20, 2023Updated 2 years ago
- CatchMail can be used to find some email addresses!☆73May 22, 2023Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- The Whitepaper For Enterprise Security created by Monster Zero Team☆36Jun 3, 2017Updated 8 years ago
- An epic web shell☆85Jun 10, 2025Updated 8 months ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Silly Android app to bypass stupid Facebook's limitation that forces user to use Messenger app to chat with contacts, instead of normal b…☆10Jun 15, 2016Updated 9 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago