byt3bl33d3r / MemeGeneratorLinks
Modern problems require modern solutions
☆32Updated 3 years ago
Alternatives and similar repositories for MemeGenerator
Users that are interested in MemeGenerator are comparing it to the libraries listed below
Sorting:
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Script is a proof of concept how to control your machine by using social media sites.☆23Updated 7 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Simple Karma Attack☆69Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆211Updated 6 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Updated 7 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 7 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- One line PS scripts that may come handy during your network assesment☆77Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- ☆59Updated 7 years ago
- ☆82Updated 2 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- ☆15Updated 2 years ago
- Hiding implants in HTML files☆65Updated 5 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Search drives for documents containing passwords☆64Updated 11 years ago
- Enumerates users based off RDP Screenshots☆35Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Updated 6 years ago