bonedaddy / escort
ssshh its a secret ;)
☆22Updated 2 years ago
Alternatives and similar repositories for escort:
Users that are interested in escort are comparing it to the libraries listed below
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 3 years ago
- Public exploits☆15Updated 6 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆24Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated last month
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated last year
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Open YARA scan- and search engine☆19Updated 2 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago