byt3n33dl3 / CamHoundADView external linksLinks
Automated exploit scanners for public CCTV's services and other polaroid public stuff.
β23Sep 29, 2024Updated last year
Alternatives and similar repositories for CamHoundAD
Users that are interested in CamHoundAD are comparing it to the libraries listed below
Sorting:
- π± Ronin the Shogun, WebApp parameter analysis and fuzzer for XSS and SSRF.β14Sep 8, 2024Updated last year
- Six Degrees of Enterprise Domain Adminβ28Jun 5, 2025Updated 8 months ago
- World's most advanced Mach-O and TCC binary malware for macOS or Unix-based distro.β44Sep 15, 2024Updated last year
- The Network Relay Execution Tool.β17Sep 23, 2024Updated last year
- Github Profile Readme (https://byt3n33dl3.substack.com/)β36Nov 12, 2025Updated 3 months ago
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.β26Nov 22, 2024Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.β44Jan 4, 2025Updated last year
- Custom BloodHound graph, connecting relationships for Attack-paths.β55Feb 15, 2025Updated last year
- Backdoor for Rubella on Shell'sβ32May 4, 2024Updated last year
- Active Directory kerberos attack framworks.β43Sep 11, 2024Updated last year
- iCloud security assessor.β28Sep 6, 2024Updated last year
- Seven Degrees of Domain Adminβ85Oct 28, 2024Updated last year
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.β16Sep 11, 2024Updated last year
- Support CobaltStrike kit for File System (NTFS/NPFS) Minifilter Drivers error handling.β17Jul 19, 2024Updated last year
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.β13Sep 11, 2024Updated last year
- Internal data collector for BloodHound and BlackMarlinExec pathway strategies, and attack surface elimination.β107Apr 17, 2025Updated 10 months ago
- Android attack for root-ed Android kit, including ASLR and SSL-pinning test mechanism.β39Jul 25, 2024Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oβ¦β49Jul 14, 2024Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β13Jun 24, 2024Updated last year
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.β17Jul 17, 2024Updated last year
- World's most advanced mobile security frameworks and surveillance.β80Oct 12, 2025Updated 4 months ago
- CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.β88Nov 22, 2024Updated last year
- Defense evasion collections and pentesting frameworks for assessment, following Greenbone and openVAS.β124Jul 9, 2024Updated last year
- Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Programβ¦β68May 15, 2024Updated last year
- Adversarial frameworks for Android and iOS sandbox evasion.β267Sep 28, 2024Updated last year
- C2 Application based GUI with the agent generator.β13May 12, 2025Updated 9 months ago
- π BotNet ( .NET ) Source Codesβ14May 2, 2024Updated last year
- NOC is an Integration Bypasser, Change PoC Binary to quirks of working with the LLVM.β11Jul 22, 2024Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Jun 10, 2024Updated last year
- Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.β27Jul 7, 2024Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.β53Oct 27, 2024Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Jul 18, 2024Updated last year
- β11Updated this week
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.β13Jul 11, 2024Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.β21Jul 8, 2024Updated last year
- Implemented a data structure that will help solve a simplified version of the mobile phone tracking problem, i.e., the fundamental probleβ¦β11Oct 18, 2018Updated 7 years ago
- Java decompilation & deobfuscation lab - dockerized toolsetβ14Updated this week
- Decode HikVision device export QR codes.β16May 5, 2025Updated 9 months ago
- Shadow APK Crypterβ11May 31, 2025Updated 8 months ago