b3d3c / BDsploit
BDsploit (Big Data Exploitation and Post-exploitation Toolkit)
☆5Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for BDsploit
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Collection of cracked malware☆14Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆18Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- A collection of personal ZAP scripts☆13Updated last year
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Wordlists generated over the years of penetration testing☆10Updated 6 months ago
- Sp00fer blog post -☆25Updated 2 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 3 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆11Updated 5 years ago
- Just a bunch of useful scripts for netsec/admin/others☆14Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago