byt3bl33d3r / Empire
Empire is a PowerShell and Python 3.x post-exploitation framework.
☆16Updated 4 years ago
Related projects: ⓘ
- PowerSploit - A PowerShell Post-Exploitation Framework☆17Updated 4 years ago
- Some useful scripts for CobaltStrike☆9Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆11Updated 4 years ago
- ☆27Updated this week
- ☆17Updated this week
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆27Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Red Team Tool Kit☆13Updated 5 years ago
- ☆25Updated this week
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆24Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆11Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 2 months ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆32Updated last year
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆16Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆9Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆13Updated 3 years ago
- ☆22Updated this week
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆16Updated 5 years ago
- WebHook for Red Team☆24Updated 3 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Updated 4 years ago
- Undetectable Windows Payload Generation☆10Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago