brosck / Zoris
γπͺγThe hidden hookless backdoor
β12Updated 4 months ago
Alternatives and similar repositories for Zoris:
Users that are interested in Zoris are comparing it to the libraries listed below
- γπγTool created to extract metadata from a domainβ13Updated 4 months ago
- β13Updated 3 weeks ago
- Priv8 Tools Software Mass Dork Auto Exploit.β13Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.β21Updated 2 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β14Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- Recon-ng modules for basic OSINT.β11Updated 2 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticatβ¦β8Updated 11 months ago
- β9Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7Updated 2 years ago
- Enumeration & fingerprint toolβ24Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β15Updated 8 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerabilityβ9Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 3 years ago
- web based c2 π΄ββ οΈβ13Updated 8 months ago
- This tool will help in generating reverse shells easily for all types of OS.β19Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β28Updated 2 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPTβ17Updated 5 months ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.β8Updated 3 years ago
- H&E- Burp Highlighter and Extractorβ18Updated 2 years ago
- my mini collection of exploits and scripts for pentestβ11Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)β23Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bountyβ13Updated 3 years ago
- π Python Exploit for CVE-2022-23935β13Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.β34Updated last month
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β38Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β18Updated last year