bad-hombres / superttyView external linksLinks
Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell
☆26Mar 17, 2019Updated 6 years ago
Alternatives and similar repositories for supertty
Users that are interested in supertty are comparing it to the libraries listed below
Sorting:
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆15Sep 4, 2024Updated last year
- ☆12Jan 31, 2020Updated 6 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- ☆10Jun 22, 2025Updated 7 months ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- ☆12Aug 29, 2025Updated 5 months ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆42Aug 16, 2022Updated 3 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Aug 28, 2021Updated 4 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago