brosck / ZorisLinks
γπͺγThe hidden hookless backdoor
β12Updated 6 months ago
Alternatives and similar repositories for Zoris
Users that are interested in Zoris are comparing it to the libraries listed below
Sorting:
- β14Updated 3 months ago
- γπγTool created to extract metadata from a domainβ14Updated 6 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.β8Updated 3 years ago
- β10Updated 2 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7Updated 3 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.β21Updated 4 months ago
- Automate Blind SQL Injection with Python.β23Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerabilityβ8Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β15Updated 11 months ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ26Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementationβ12Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaksβ26Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.β13Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 3 years ago
- Malware Libraries focused in help Malware Developmentβ23Updated 2 years ago
- β16Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 3 years ago
- web based c2 π΄ββ οΈβ13Updated 10 months ago
- γπͺγLinux Backdoor based on ICMP protocolβ61Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated last year
- β12Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.β12Updated last year
- my mini collection of exploits and scripts for pentestβ12Updated 2 years ago
- This tool will help in generating reverse shells easily for all types of OS.β20Updated last year