bad-hombres / superttyView external linksLinks
Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell
☆26Mar 17, 2019Updated 6 years ago
Alternatives and similar repositories for supertty
Users that are interested in supertty are comparing it to the libraries listed below
Sorting:
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- ☆15Sep 4, 2024Updated last year
- ☆12Jan 31, 2020Updated 6 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆10Jun 22, 2025Updated 7 months ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Saves pages to Wayback machine☆13Dec 2, 2024Updated last year
- ☆12Aug 29, 2025Updated 5 months ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Aug 28, 2021Updated 4 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago