☆99May 3, 2018Updated 7 years ago
Alternatives and similar repositories for The-Axer
Users that are interested in The-Axer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆165May 18, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- Empire client application☆504Mar 10, 2022Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆419Aug 10, 2023Updated 2 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆207Dec 9, 2023Updated 2 years ago
- Pop shells like a master.☆1,486Apr 2, 2019Updated 7 years ago
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- ☆183Feb 21, 2022Updated 4 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- wordpress hash cracker .☆65Sep 7, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 6 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 7 months ago
- Drupal enumeration & exploitation tool☆609Nov 4, 2020Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆273May 15, 2017Updated 8 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆66Feb 10, 2018Updated 8 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago