casterbyte / Above
Network Security Sniffer
☆785Updated 2 weeks ago
Alternatives and similar repositories for Above
Users that are interested in Above are comparing it to the libraries listed below
Sorting:
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆905Updated last month
- ☆542Updated last year
- Kali noise reduction tool☆314Updated last month
- ☆312Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆738Updated 4 months ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆314Updated 2 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,097Updated last week
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated 10 months ago
- Script for generating revshells☆469Updated 8 months ago
- A RedTeam Toolkit☆397Updated last month
- A python tool to automate KeePass discovery and secret extraction.☆486Updated 5 months ago
- Shodan Dorks☆353Updated 3 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,079Updated 10 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆569Updated 6 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆767Updated this week
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆393Updated 3 months ago
- ☆344Updated last year
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆997Updated 9 months ago
- Harvest passwords automatically from OpenSSH server☆373Updated last year
- A monster cheatsheet on MITM attacks☆349Updated last month
- HTTP 403 bypass tool☆510Updated last year
- Nmap Dashboard Mini Project☆584Updated 11 months ago
- An offensive data enrichment pipeline☆674Updated 3 weeks ago
- WiFi Penetration Testing & Auditing Tool☆514Updated 2 weeks ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆364Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 8 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆679Updated 9 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆788Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆381Updated 7 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆651Updated 2 months ago